Unnamed: 0
int64
0
832k
id
float64
2.49B
32.1B
type
stringclasses
1 value
created_at
stringlengths
19
19
repo
stringlengths
5
112
repo_url
stringlengths
34
141
action
stringclasses
3 values
title
stringlengths
1
844
labels
stringlengths
4
721
body
stringlengths
1
261k
index
stringclasses
12 values
text_combine
stringlengths
96
261k
label
stringclasses
2 values
text
stringlengths
96
248k
binary_label
int64
0
1
205,223
15,964,725,111
IssuesEvent
2021-04-16 06:43:36
nicoleang09/pe
https://api.github.com/repos/nicoleang09/pe
opened
Ordering of deliveries not stated in sections where delivery status is set
severity.Low type.DocumentationBug
As a user who jumped straight into the features section, I was very confused when I marked orders 1, 2 and 3 as delivered and they disappeared from view. This behaviour is not stated in the `delivered` feature section and can potentially be confusing for users. ![image.png](https://raw.githubusercontent.com/nicoleang09/pe/main/files/9310b0b8-c0d7-45d7-a6fa-0393462068b2.png) <!--session: 1618552599099-89c22cef-a6eb-4194-9c2a-10e1e5147fea-->
1.0
Ordering of deliveries not stated in sections where delivery status is set - As a user who jumped straight into the features section, I was very confused when I marked orders 1, 2 and 3 as delivered and they disappeared from view. This behaviour is not stated in the `delivered` feature section and can potentially be confusing for users. ![image.png](https://raw.githubusercontent.com/nicoleang09/pe/main/files/9310b0b8-c0d7-45d7-a6fa-0393462068b2.png) <!--session: 1618552599099-89c22cef-a6eb-4194-9c2a-10e1e5147fea-->
non_priority
ordering of deliveries not stated in sections where delivery status is set as a user who jumped straight into the features section i was very confused when i marked orders and as delivered and they disappeared from view this behaviour is not stated in the delivered feature section and can potentially be confusing for users
0
46,449
19,189,154,426
IssuesEvent
2021-12-05 18:06:10
AndreyPomelov/Telegram-bot
https://api.github.com/repos/AndreyPomelov/Telegram-bot
opened
Создать restapi для event-service
enhancement event-service
Данные передаются в формате json. Единицей данных будет json объект "Событие" вида: ``` { "id" : int, "name": string, "description" : string, "link" : string, "date_start" : datetime, "date_end" : datetime, "tags" : string } ```
1.0
Создать restapi для event-service - Данные передаются в формате json. Единицей данных будет json объект "Событие" вида: ``` { "id" : int, "name": string, "description" : string, "link" : string, "date_start" : datetime, "date_end" : datetime, "tags" : string } ```
non_priority
создать restapi для event service данные передаются в формате json единицей данных будет json объект событие вида id int name string description string link string date start datetime date end datetime tags string
0
1,281
2,722,355,213
IssuesEvent
2015-04-14 02:44:11
neovim/neovim
https://api.github.com/repos/neovim/neovim
closed
[RFC] / Master issue: Compiling under Windows (VS2013)
buildsystem compiler:msvc platform:windows
I'm (sort-of) interested in getting this working under VS2013, so I'd have a native-built neovim instead of relying on MinGW or similar (although this may be a valid goal as well) I'd like to collate issues here that are stopping compilation of neovim on Windows on VS2013, in lieu of GitHub having proper blocker/issue dependency support For now running `cmake -G Visual Studio 12` results in: CMake Error at C:/Program Files (x86)/CMake 2.8/share/cmake-2.8/Modules/FindPackageHandleStandardArgs.cmake:108 (message): Could NOT find LibUV (missing: LIBUV_LIBRARY LIBUV_INCLUDE_DIR) Call Stack (most recent call first): C:/Program Files (x86)/CMake 2.8/share/cmake-2.8/Modules /FindPackageHandleStandardArgs.cmake:315 (_FPHSA_FAILURE_MESSAGE) cmake/FindLibUV.cmake:90 (find_package_handle_standard_args) CMakeLists.txt:51 (find_package) Todo: - [x] Attempt to build neovim using cmake and VS2013 - [x] Build & install libuv somewhere that cmake can find it - [ ] Port if_cscope to use libuv (https://github.com/neovim/neovim/pull/810#issuecomment-45277957) - [x] start thinking about how to split platform code (os_unix.c os_msvc.c etc) - [ ] Add bracket to if statements (maybe?) - [ ] Start splitting compiler options in CMake - [ ] Refactor vim_FulllName - [ ] Add include guards: sys/time.h unistd.h - [ ] Reorder includes here and there, i.e. ensure platform includes and/or vim.h are included before anything else - [ ] Document the above - [ ] ??? - [ ] Profit Thanks to @equalsraf for the above <bountysource-plugin> --- Want to back this issue? **[Place a bounty on it!](https://www.bountysource.com/issues/2022535-rfc-master-issue-compiling-under-windows-vs2013?utm_campaign=plugin&utm_content=tracker%2F461131&utm_medium=issues&utm_source=github)** We accept bounties via [Bountysource](https://www.bountysource.com/?utm_campaign=plugin&utm_content=tracker%2F461131&utm_medium=issues&utm_source=github). </bountysource-plugin>
1.0
[RFC] / Master issue: Compiling under Windows (VS2013) - I'm (sort-of) interested in getting this working under VS2013, so I'd have a native-built neovim instead of relying on MinGW or similar (although this may be a valid goal as well) I'd like to collate issues here that are stopping compilation of neovim on Windows on VS2013, in lieu of GitHub having proper blocker/issue dependency support For now running `cmake -G Visual Studio 12` results in: CMake Error at C:/Program Files (x86)/CMake 2.8/share/cmake-2.8/Modules/FindPackageHandleStandardArgs.cmake:108 (message): Could NOT find LibUV (missing: LIBUV_LIBRARY LIBUV_INCLUDE_DIR) Call Stack (most recent call first): C:/Program Files (x86)/CMake 2.8/share/cmake-2.8/Modules /FindPackageHandleStandardArgs.cmake:315 (_FPHSA_FAILURE_MESSAGE) cmake/FindLibUV.cmake:90 (find_package_handle_standard_args) CMakeLists.txt:51 (find_package) Todo: - [x] Attempt to build neovim using cmake and VS2013 - [x] Build & install libuv somewhere that cmake can find it - [ ] Port if_cscope to use libuv (https://github.com/neovim/neovim/pull/810#issuecomment-45277957) - [x] start thinking about how to split platform code (os_unix.c os_msvc.c etc) - [ ] Add bracket to if statements (maybe?) - [ ] Start splitting compiler options in CMake - [ ] Refactor vim_FulllName - [ ] Add include guards: sys/time.h unistd.h - [ ] Reorder includes here and there, i.e. ensure platform includes and/or vim.h are included before anything else - [ ] Document the above - [ ] ??? - [ ] Profit Thanks to @equalsraf for the above <bountysource-plugin> --- Want to back this issue? **[Place a bounty on it!](https://www.bountysource.com/issues/2022535-rfc-master-issue-compiling-under-windows-vs2013?utm_campaign=plugin&utm_content=tracker%2F461131&utm_medium=issues&utm_source=github)** We accept bounties via [Bountysource](https://www.bountysource.com/?utm_campaign=plugin&utm_content=tracker%2F461131&utm_medium=issues&utm_source=github). </bountysource-plugin>
non_priority
master issue compiling under windows i m sort of interested in getting this working under so i d have a native built neovim instead of relying on mingw or similar although this may be a valid goal as well i d like to collate issues here that are stopping compilation of neovim on windows on in lieu of github having proper blocker issue dependency support for now running cmake g visual studio results in cmake error at c program files cmake share cmake modules findpackagehandlestandardargs cmake message could not find libuv missing libuv library libuv include dir call stack most recent call first c program files cmake share cmake modules findpackagehandlestandardargs cmake fphsa failure message cmake findlibuv cmake find package handle standard args cmakelists txt find package todo attempt to build neovim using cmake and build install libuv somewhere that cmake can find it port if cscope to use libuv start thinking about how to split platform code os unix c os msvc c etc add bracket to if statements maybe start splitting compiler options in cmake refactor vim fulllname add include guards sys time h unistd h reorder includes here and there i e ensure platform includes and or vim h are included before anything else document the above profit thanks to equalsraf for the above want to back this issue we accept bounties via
0
69,540
8,419,284,293
IssuesEvent
2018-10-15 06:06:04
monteirocamis/trocatexproject
https://api.github.com/repos/monteirocamis/trocatexproject
opened
Logo TrocaTex
UX/UI designer frontend help wanted photoshop
We need a logo for our project that shows change, movement , eco and modern stuff . Insert your idea on _Imgs_ folder
1.0
Logo TrocaTex - We need a logo for our project that shows change, movement , eco and modern stuff . Insert your idea on _Imgs_ folder
non_priority
logo trocatex we need a logo for our project that shows change movement eco and modern stuff insert your idea on imgs folder
0
2,865
10,271,528,735
IssuesEvent
2019-08-23 16:19:34
arcticicestudio/arctic
https://api.github.com/repos/arcticicestudio/arctic
opened
GitHub code owners
context-workflow scope-maintainability scope-quality scope-stability type-task
<p align="center"><img src="https://user-images.githubusercontent.com/7836623/63598769-85c23200-c5c0-11e9-967e-c8b3e5b43458.png" width="18%" /></p> The project should adapt to GitHub's [code owners][intro] feature. This will allow to define matching pattern for project paths to automatically add all required reviewers of the core team and contributors to new PRs. See [GitHub Help][help] for more details. <p> <figure> <div align="center"> <img src="https://user-images.githubusercontent.com/7836623/63598793-91adf400-c5c0-11e9-99f8-2feaeaf57bd3.png" /> <figcaption>Sidebar for <em>code owner</em> PR review requests and review stats</figcaption> </div> </figure> </p> <p> <figure> <div align="center"> <img src="https://user-images.githubusercontent.com/7836623/63599279-8effce80-c5c1-11e9-9b87-1e1c276f7c6d.png" /> <figcaption>Branch protection configuration to enable required <em>code owner</em> review approvals</figcaption> </div> </figure> </p> <p> <figure> <div align="center"> <img src="https://user-images.githubusercontent.com/2513/27803610-544ba222-5ff8-11e7-9313-e4062315fb0c.png" /> <figcaption>PR status checks when required <em>code owner</em> review is pending</figcaption> </div> </figure> </p> [help]: https://help.github.com/articles/about-codeowners [intro]: https://github.com/blog/2392-introducing-code-owners
True
GitHub code owners - <p align="center"><img src="https://user-images.githubusercontent.com/7836623/63598769-85c23200-c5c0-11e9-967e-c8b3e5b43458.png" width="18%" /></p> The project should adapt to GitHub's [code owners][intro] feature. This will allow to define matching pattern for project paths to automatically add all required reviewers of the core team and contributors to new PRs. See [GitHub Help][help] for more details. <p> <figure> <div align="center"> <img src="https://user-images.githubusercontent.com/7836623/63598793-91adf400-c5c0-11e9-99f8-2feaeaf57bd3.png" /> <figcaption>Sidebar for <em>code owner</em> PR review requests and review stats</figcaption> </div> </figure> </p> <p> <figure> <div align="center"> <img src="https://user-images.githubusercontent.com/7836623/63599279-8effce80-c5c1-11e9-9b87-1e1c276f7c6d.png" /> <figcaption>Branch protection configuration to enable required <em>code owner</em> review approvals</figcaption> </div> </figure> </p> <p> <figure> <div align="center"> <img src="https://user-images.githubusercontent.com/2513/27803610-544ba222-5ff8-11e7-9313-e4062315fb0c.png" /> <figcaption>PR status checks when required <em>code owner</em> review is pending</figcaption> </div> </figure> </p> [help]: https://help.github.com/articles/about-codeowners [intro]: https://github.com/blog/2392-introducing-code-owners
non_priority
github code owners the project should adapt to github s feature this will allow to define matching pattern for project paths to automatically add all required reviewers of the core team and contributors to new prs see for more details sidebar for code owner pr review requests and review stats branch protection configuration to enable required code owner review approvals pr status checks when required code owner review is pending
0
410,310
27,779,249,657
IssuesEvent
2023-03-16 19:36:57
mindsdb/mindsdb
https://api.github.com/repos/mindsdb/mindsdb
closed
[Docs] Update a link to the Apache Hive integration
help wanted good first issue documentation first-timers-only
## Instructions :page_facing_up: Here are the step-by-step instructions: 1. Go to the file `/mindsdb/README.md`. 2. Find the section titled `## Database Integrations`. This section contains a table with integrations and their logos. 3. Find the below HTML tag: `<a href="https://docs.mindsdb.com/"><img src="https://img.shields.io/badge/Apache%20Hive-FDEE21?logo=apachehive&logoColor=000&style=for-the-badge" alt="Apache Hive Badge"></a>` 4. Update the `href` value to this link: https://docs.mindsdb.com/data-integrations/all-data-integrations#hive 5. Save the changes and create a PR. ## Hackathon Issue :loudspeaker: MindsDB has organized a hackathon to let in more contributors to the in-database ML world. Each hackathon issue is worth a certain amount of credits that will bring you prizes by the end of the MindsDB Hackathon. Check out the [MindsDB Hackathon rules](https://mindsdb.com/mindsdb-hackathon)! ## The https://github.com/mindsdb/mindsdb/labels/first-timers-only Label We are happy to welcome you on board! Please take a look at the rules below for first-time contributors. 1. You can solve only one issue labeled as https://github.com/mindsdb/mindsdb/labels/first-timers-only. After that, please look at other issues labeled as https://github.com/mindsdb/mindsdb/labels/good%20first%20issue, https://github.com/mindsdb/mindsdb/labels/help%20wanted, or https://github.com/mindsdb/mindsdb/labels/integration. 2. After you create your first PR in the MindsDB repository, please sign our CLA to become a MindsDB contributor. You can do that by leaving a comment that contains the following: `I have read the CLA Document and I hereby sign the CLA` Thank you for contributing to MindsDB!
1.0
[Docs] Update a link to the Apache Hive integration - ## Instructions :page_facing_up: Here are the step-by-step instructions: 1. Go to the file `/mindsdb/README.md`. 2. Find the section titled `## Database Integrations`. This section contains a table with integrations and their logos. 3. Find the below HTML tag: `<a href="https://docs.mindsdb.com/"><img src="https://img.shields.io/badge/Apache%20Hive-FDEE21?logo=apachehive&logoColor=000&style=for-the-badge" alt="Apache Hive Badge"></a>` 4. Update the `href` value to this link: https://docs.mindsdb.com/data-integrations/all-data-integrations#hive 5. Save the changes and create a PR. ## Hackathon Issue :loudspeaker: MindsDB has organized a hackathon to let in more contributors to the in-database ML world. Each hackathon issue is worth a certain amount of credits that will bring you prizes by the end of the MindsDB Hackathon. Check out the [MindsDB Hackathon rules](https://mindsdb.com/mindsdb-hackathon)! ## The https://github.com/mindsdb/mindsdb/labels/first-timers-only Label We are happy to welcome you on board! Please take a look at the rules below for first-time contributors. 1. You can solve only one issue labeled as https://github.com/mindsdb/mindsdb/labels/first-timers-only. After that, please look at other issues labeled as https://github.com/mindsdb/mindsdb/labels/good%20first%20issue, https://github.com/mindsdb/mindsdb/labels/help%20wanted, or https://github.com/mindsdb/mindsdb/labels/integration. 2. After you create your first PR in the MindsDB repository, please sign our CLA to become a MindsDB contributor. You can do that by leaving a comment that contains the following: `I have read the CLA Document and I hereby sign the CLA` Thank you for contributing to MindsDB!
non_priority
update a link to the apache hive integration instructions page facing up here are the step by step instructions go to the file mindsdb readme md find the section titled database integrations this section contains a table with integrations and their logos find the below html tag update the href value to this link save the changes and create a pr hackathon issue loudspeaker mindsdb has organized a hackathon to let in more contributors to the in database ml world each hackathon issue is worth a certain amount of credits that will bring you prizes by the end of the mindsdb hackathon check out the the label we are happy to welcome you on board please take a look at the rules below for first time contributors you can solve only one issue labeled as after that please look at other issues labeled as or after you create your first pr in the mindsdb repository please sign our cla to become a mindsdb contributor you can do that by leaving a comment that contains the following i have read the cla document and i hereby sign the cla thank you for contributing to mindsdb
0
176,352
21,408,678,992
IssuesEvent
2022-04-22 01:40:32
liaozan/houses_single
https://api.github.com/repos/liaozan/houses_single
closed
CVE-2016-10735 (Medium) detected in bootstrap-3.1.1.js, bootstrap-3.1.1.min.js
security vulnerability
## CVE-2016-10735 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>bootstrap-3.1.1.js</b>, <b>bootstrap-3.1.1.min.js</b></p></summary> <p> <details><summary><b>bootstrap-3.1.1.js</b></p></summary> <p>The most popular front-end framework for developing responsive, mobile first projects on the web.</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.1.1/js/bootstrap.js">https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.1.1/js/bootstrap.js</a></p> <p>Path to vulnerable library: /web/src/main/resources/static/static/assets/bootstrap/js/bootstrap.js</p> <p> Dependency Hierarchy: - :x: **bootstrap-3.1.1.js** (Vulnerable Library) </details> <details><summary><b>bootstrap-3.1.1.min.js</b></p></summary> <p>The most popular front-end framework for developing responsive, mobile first projects on the web.</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.1.1/js/bootstrap.min.js">https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.1.1/js/bootstrap.min.js</a></p> <p>Path to vulnerable library: /web/src/main/resources/static/static/assets/bootstrap/js/bootstrap.min.js</p> <p> Dependency Hierarchy: - :x: **bootstrap-3.1.1.min.js** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/liaozan/houses_single/commit/ba9621f72aed65c0e937586b8321d606047276ce">ba9621f72aed65c0e937586b8321d606047276ce</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In Bootstrap 3.x before 3.4.0 and 4.x-beta before 4.0.0-beta.2, XSS is possible in the data-target attribute, a different vulnerability than CVE-2018-14041. <p>Publish Date: 2019-01-09 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-10735>CVE-2016-10735</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/twbs/bootstrap/issues/20184">https://github.com/twbs/bootstrap/issues/20184</a></p> <p>Release Date: 2019-01-09</p> <p>Fix Resolution: 3.4.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2016-10735 (Medium) detected in bootstrap-3.1.1.js, bootstrap-3.1.1.min.js - ## CVE-2016-10735 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>bootstrap-3.1.1.js</b>, <b>bootstrap-3.1.1.min.js</b></p></summary> <p> <details><summary><b>bootstrap-3.1.1.js</b></p></summary> <p>The most popular front-end framework for developing responsive, mobile first projects on the web.</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.1.1/js/bootstrap.js">https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.1.1/js/bootstrap.js</a></p> <p>Path to vulnerable library: /web/src/main/resources/static/static/assets/bootstrap/js/bootstrap.js</p> <p> Dependency Hierarchy: - :x: **bootstrap-3.1.1.js** (Vulnerable Library) </details> <details><summary><b>bootstrap-3.1.1.min.js</b></p></summary> <p>The most popular front-end framework for developing responsive, mobile first projects on the web.</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.1.1/js/bootstrap.min.js">https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.1.1/js/bootstrap.min.js</a></p> <p>Path to vulnerable library: /web/src/main/resources/static/static/assets/bootstrap/js/bootstrap.min.js</p> <p> Dependency Hierarchy: - :x: **bootstrap-3.1.1.min.js** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/liaozan/houses_single/commit/ba9621f72aed65c0e937586b8321d606047276ce">ba9621f72aed65c0e937586b8321d606047276ce</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In Bootstrap 3.x before 3.4.0 and 4.x-beta before 4.0.0-beta.2, XSS is possible in the data-target attribute, a different vulnerability than CVE-2018-14041. <p>Publish Date: 2019-01-09 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-10735>CVE-2016-10735</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/twbs/bootstrap/issues/20184">https://github.com/twbs/bootstrap/issues/20184</a></p> <p>Release Date: 2019-01-09</p> <p>Fix Resolution: 3.4.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in bootstrap js bootstrap min js cve medium severity vulnerability vulnerable libraries bootstrap js bootstrap min js bootstrap js the most popular front end framework for developing responsive mobile first projects on the web library home page a href path to vulnerable library web src main resources static static assets bootstrap js bootstrap js dependency hierarchy x bootstrap js vulnerable library bootstrap min js the most popular front end framework for developing responsive mobile first projects on the web library home page a href path to vulnerable library web src main resources static static assets bootstrap js bootstrap min js dependency hierarchy x bootstrap min js vulnerable library found in head commit a href found in base branch master vulnerability details in bootstrap x before and x beta before beta xss is possible in the data target attribute a different vulnerability than cve publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
24,935
4,118,267,941
IssuesEvent
2016-06-08 10:45:23
mathjax/MathJax
https://api.github.com/repos/mathjax/MathJax
closed
[Math Processing Error] when replacing msub by msup in an expression with nested mmultiscripts
Accepted Merged Test Needed
Hi, here a surprising result I just encountered today : The only difference between (A) and (C) is I replaced msub by msup, the difference between (B) and (C) seems to be the mrow. **(A) This works:** ``` <math> <mmultiscripts> <mmultiscripts> <mi>A</mi> <mi>B</mi> <mprescripts /> <none /> <mi>D</mi> </mmultiscripts> <mrow> <mo>(</mo> <msub> <mi>g</mi> <mi>h</mi> </msub> <mo>)</mo> </mrow> <mprescripts /> <none /> <mi>i</mi> </mmultiscripts> </math> ``` **(B) This works :** ``` <math> <mmultiscripts> <mmultiscripts> <mi>A</mi> <mi>B</mi> <mprescripts /> <none /> <mi>D</mi> </mmultiscripts> <msup> <mi>g</mi> <mi>h</mi> </msup> <mprescripts /> <none /> <mi>i</mi> </mmultiscripts> </math> ``` **(C) This yields [Math Processing Error] :** ``` <math> <mmultiscripts> <mmultiscripts> <mi>A</mi> <mi>B</mi> <mprescripts /> <none /> <mi>D</mi> </mmultiscripts> <mrow> <mo>(</mo> <msup> <mi>g</mi> <mi>h</mi> </msup> <mo>)</mo> </mrow> <mprescripts /> <none /> <mi>i</mi> </mmultiscripts> </math> ```
1.0
[Math Processing Error] when replacing msub by msup in an expression with nested mmultiscripts - Hi, here a surprising result I just encountered today : The only difference between (A) and (C) is I replaced msub by msup, the difference between (B) and (C) seems to be the mrow. **(A) This works:** ``` <math> <mmultiscripts> <mmultiscripts> <mi>A</mi> <mi>B</mi> <mprescripts /> <none /> <mi>D</mi> </mmultiscripts> <mrow> <mo>(</mo> <msub> <mi>g</mi> <mi>h</mi> </msub> <mo>)</mo> </mrow> <mprescripts /> <none /> <mi>i</mi> </mmultiscripts> </math> ``` **(B) This works :** ``` <math> <mmultiscripts> <mmultiscripts> <mi>A</mi> <mi>B</mi> <mprescripts /> <none /> <mi>D</mi> </mmultiscripts> <msup> <mi>g</mi> <mi>h</mi> </msup> <mprescripts /> <none /> <mi>i</mi> </mmultiscripts> </math> ``` **(C) This yields [Math Processing Error] :** ``` <math> <mmultiscripts> <mmultiscripts> <mi>A</mi> <mi>B</mi> <mprescripts /> <none /> <mi>D</mi> </mmultiscripts> <mrow> <mo>(</mo> <msup> <mi>g</mi> <mi>h</mi> </msup> <mo>)</mo> </mrow> <mprescripts /> <none /> <mi>i</mi> </mmultiscripts> </math> ```
non_priority
when replacing msub by msup in an expression with nested mmultiscripts hi here a surprising result i just encountered today the only difference between a and c is i replaced msub by msup the difference between b and c seems to be the mrow a this works a b d g h i b this works a b d g h i c this yields a b d g h i
0
98,393
8,675,533,318
IssuesEvent
2018-11-30 11:10:27
NativeScript/nativescript-cli
https://api.github.com/repos/NativeScript/nativescript-cli
closed
Don't prepare the project on preview command
ready for test
**Is your feature request related to a problem? Please describe.** The project is prepared on preview command but actually no prepare is needed. This way the liveSync to preview app will be faster.
1.0
Don't prepare the project on preview command - **Is your feature request related to a problem? Please describe.** The project is prepared on preview command but actually no prepare is needed. This way the liveSync to preview app will be faster.
non_priority
don t prepare the project on preview command is your feature request related to a problem please describe the project is prepared on preview command but actually no prepare is needed this way the livesync to preview app will be faster
0
9,635
24,939,272,677
IssuesEvent
2022-10-31 17:30:47
Azure/azure-sdk
https://api.github.com/repos/Azure/azure-sdk
closed
Board Review: Event Grid new system events
architecture board-review
## Contacts and Timeline * Responsible service team: DataBox, APIM * Main contacts: @JoshLove-msft * Expected code complete date: 11/4 * Expected release date: 11/7 ## About the Service * Link to the service REST APIs: https://github.com/Azure/azure-rest-api-specs/pull/21157 https://github.com/Azure/azure-rest-api-specs/pull/20871 ## Artifacts required (per language) ### .NET * APIView Link: To be added ### Java * APIView Link: To be added ### Python * APIView Link: N/A ### TypeScript * APIView Link: To be added For all other languages, send a request to the Architecture Board to discuss the best format on individual basis. ## Thank you!
1.0
Board Review: Event Grid new system events - ## Contacts and Timeline * Responsible service team: DataBox, APIM * Main contacts: @JoshLove-msft * Expected code complete date: 11/4 * Expected release date: 11/7 ## About the Service * Link to the service REST APIs: https://github.com/Azure/azure-rest-api-specs/pull/21157 https://github.com/Azure/azure-rest-api-specs/pull/20871 ## Artifacts required (per language) ### .NET * APIView Link: To be added ### Java * APIView Link: To be added ### Python * APIView Link: N/A ### TypeScript * APIView Link: To be added For all other languages, send a request to the Architecture Board to discuss the best format on individual basis. ## Thank you!
non_priority
board review event grid new system events contacts and timeline responsible service team databox apim main contacts joshlove msft expected code complete date expected release date about the service link to the service rest apis artifacts required per language net apiview link to be added java apiview link to be added python apiview link n a typescript apiview link to be added for all other languages send a request to the architecture board to discuss the best format on individual basis thank you
0
359,873
25,259,614,612
IssuesEvent
2022-11-15 21:24:59
bUnit-dev/bUnit
https://api.github.com/repos/bUnit-dev/bUnit
closed
Investigate QuickGrid in .NET7
documentation
With the ASP.NET Core 7 Preview 6 announcements they also introduced QuickGrid as an external package. Even though this is not a first class citizen directly inside aspnet chances are lots of people will use it as a lightweight alternative to full blown grids. Currently it is flagged experimental. We should have an eye on that and make it was to setup in bUnit if it needs further setup. Article: https://aspnet.github.io/quickgridsamples/
1.0
Investigate QuickGrid in .NET7 - With the ASP.NET Core 7 Preview 6 announcements they also introduced QuickGrid as an external package. Even though this is not a first class citizen directly inside aspnet chances are lots of people will use it as a lightweight alternative to full blown grids. Currently it is flagged experimental. We should have an eye on that and make it was to setup in bUnit if it needs further setup. Article: https://aspnet.github.io/quickgridsamples/
non_priority
investigate quickgrid in with the asp net core preview announcements they also introduced quickgrid as an external package even though this is not a first class citizen directly inside aspnet chances are lots of people will use it as a lightweight alternative to full blown grids currently it is flagged experimental we should have an eye on that and make it was to setup in bunit if it needs further setup article
0
166,513
12,960,091,102
IssuesEvent
2020-07-20 13:54:43
FreeRDP/FreeRDP
https://api.github.com/repos/FreeRDP/FreeRDP
closed
Backport Use CMake to detect availability of getlogin_r
backport-to-stable fixed-waiting-test
Releated pull request for master: #6317
1.0
Backport Use CMake to detect availability of getlogin_r - Releated pull request for master: #6317
non_priority
backport use cmake to detect availability of getlogin r releated pull request for master
0
122,630
12,156,714,029
IssuesEvent
2020-04-25 18:31:54
webpack/webpack
https://api.github.com/repos/webpack/webpack
closed
Create Outreach Communities
documentation inactive
Successfully we were able to help start and perpetuate a community for China for webpack. It's been extremely successful and we continue to see their traffic as 2nd to USA in docs, and repo page visitors. However [it came to our attention on twitter](https://twitter.com/truth2_truth/status/848567713798791169) that we could maybe be doing more. I'm all for equality as access to opportunity, and furthermore since all of us have little to no bandwidth, we'd want to find a group of developers/advocates who are willing to lead the initiative. First step would simply be to create the guidelines for how one would approach this outreach. https://twitter.com/truth2_truth/status/848567713798791169 <== this twitter account nominated themselves to write this guideline, or seems to have experience in it.
1.0
Create Outreach Communities - Successfully we were able to help start and perpetuate a community for China for webpack. It's been extremely successful and we continue to see their traffic as 2nd to USA in docs, and repo page visitors. However [it came to our attention on twitter](https://twitter.com/truth2_truth/status/848567713798791169) that we could maybe be doing more. I'm all for equality as access to opportunity, and furthermore since all of us have little to no bandwidth, we'd want to find a group of developers/advocates who are willing to lead the initiative. First step would simply be to create the guidelines for how one would approach this outreach. https://twitter.com/truth2_truth/status/848567713798791169 <== this twitter account nominated themselves to write this guideline, or seems to have experience in it.
non_priority
create outreach communities successfully we were able to help start and perpetuate a community for china for webpack it s been extremely successful and we continue to see their traffic as to usa in docs and repo page visitors however that we could maybe be doing more i m all for equality as access to opportunity and furthermore since all of us have little to no bandwidth we d want to find a group of developers advocates who are willing to lead the initiative first step would simply be to create the guidelines for how one would approach this outreach this twitter account nominated themselves to write this guideline or seems to have experience in it
0
78,128
10,040,842,708
IssuesEvent
2019-07-18 20:59:43
Jerald/yolol-is-cylons
https://api.github.com/repos/Jerald/yolol-is-cylons
opened
Write getting started guide for YOLOL
documentation
- Should provide a "hello world"-like introduction to the language - Should build a program by introducing and explaining new features - Doesn't need to include every feature in YOLOL - Should include: local vars, data fields, if statements, gotos, basic operators - Should be written for a non-technical audience - Should act as a companion document for #28 I'm willing to work on this. Any help or contributions would be appreciated.
1.0
Write getting started guide for YOLOL - - Should provide a "hello world"-like introduction to the language - Should build a program by introducing and explaining new features - Doesn't need to include every feature in YOLOL - Should include: local vars, data fields, if statements, gotos, basic operators - Should be written for a non-technical audience - Should act as a companion document for #28 I'm willing to work on this. Any help or contributions would be appreciated.
non_priority
write getting started guide for yolol should provide a hello world like introduction to the language should build a program by introducing and explaining new features doesn t need to include every feature in yolol should include local vars data fields if statements gotos basic operators should be written for a non technical audience should act as a companion document for i m willing to work on this any help or contributions would be appreciated
0
49,617
13,454,886,939
IssuesEvent
2020-09-09 04:54:19
Techini/vulnado
https://api.github.com/repos/Techini/vulnado
opened
CVE-2019-14893 (High) detected in jackson-databind-2.9.8.jar
security vulnerability
## CVE-2019-14893 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /tmp/ws-scm/vulnado/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - jjwt-jackson-0.11.2.jar (Root Library) - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Techini/vulnado/commit/4fb542733bde6ab3a1680292943de904d0621c33">4fb542733bde6ab3a1680292943de904d0621c33</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A flaw was discovered in FasterXML jackson-databind in all versions before 2.9.10 and 2.10.0, where it would permit polymorphic deserialization of malicious objects using the xalan JNDI gadget when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. An attacker could use this flaw to execute arbitrary code. <p>Publish Date: 2020-03-02 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14893>CVE-2019-14893</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14893">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14893</a></p> <p>Release Date: 2020-03-02</p> <p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.10.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2019-14893 (High) detected in jackson-databind-2.9.8.jar - ## CVE-2019-14893 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /tmp/ws-scm/vulnado/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - jjwt-jackson-0.11.2.jar (Root Library) - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Techini/vulnado/commit/4fb542733bde6ab3a1680292943de904d0621c33">4fb542733bde6ab3a1680292943de904d0621c33</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A flaw was discovered in FasterXML jackson-databind in all versions before 2.9.10 and 2.10.0, where it would permit polymorphic deserialization of malicious objects using the xalan JNDI gadget when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. An attacker could use this flaw to execute arbitrary code. <p>Publish Date: 2020-03-02 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14893>CVE-2019-14893</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14893">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14893</a></p> <p>Release Date: 2020-03-02</p> <p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.10.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in jackson databind jar cve high severity vulnerability vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file tmp ws scm vulnado pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy jjwt jackson jar root library x jackson databind jar vulnerable library found in head commit a href vulnerability details a flaw was discovered in fasterxml jackson databind in all versions before and where it would permit polymorphic deserialization of malicious objects using the xalan jndi gadget when used in conjunction with polymorphic type handling methods such as enabledefaulttyping or when jsontypeinfo is using id class or id minimal class or in any other way which objectmapper readvalue might instantiate objects from unsafe sources an attacker could use this flaw to execute arbitrary code publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind step up your open source security game with whitesource
0
233,773
19,058,939,278
IssuesEvent
2021-11-26 03:13:51
askoufis/vocab-vscode-extension
https://api.github.com/repos/askoufis/vocab-vscode-extension
closed
No unit tests
testing
There are a few simple functions that could do with some unit tests, just for sanity's sake.
1.0
No unit tests - There are a few simple functions that could do with some unit tests, just for sanity's sake.
non_priority
no unit tests there are a few simple functions that could do with some unit tests just for sanity s sake
0
96,583
8,617,669,320
IssuesEvent
2018-11-20 06:44:49
humera987/FXLabs-Test-Automation
https://api.github.com/repos/humera987/FXLabs-Test-Automation
closed
projecttesting20 : ApiV1IssueTrackersSkillTypeTypeGetQueryParamPagesizeNegativeNumber
projecttesting20
Project : projecttesting20 Job : uat 1 Env : uat Region : US_WEST Result : fail Status Code : 404 Headers : {X-Content-Type-Options=[nosniff], X-XSS-Protection=[1; mode=block], Cache-Control=[no-cache, no-store, max-age=0, must-revalidate], Pragma=[no-cache], Expires=[0], X-Frame-Options=[DENY], Set-Cookie=[SESSION=ODkyMTdmOTktYmQ2Yy00OWQ1LTk3NzktODk5Njg4ZjMyOTA2; Path=/; HttpOnly], Content-Type=[application/json;charset=UTF-8], Transfer-Encoding=[chunked], Date=[Tue, 20 Nov 2018 06:20:00 GMT]} Endpoint : http://13.56.210.25/api/v1/api/v1/issue-trackers/skill-type/cInFBrdp?pageSize=-1 Request : Response : { "timestamp" : "2018-11-20T06:20:00.454+0000", "status" : 404, "error" : "Not Found", "message" : "No message available", "path" : "/api/v1/api/v1/issue-trackers/skill-type/cInFBrdp" } Logs : Assertion [@StatusCode != 401] resolved-to [404 != 401] result [Passed]Assertion [@StatusCode != 404] resolved-to [404 != 404] result [Failed] --- FX Bot ---
1.0
projecttesting20 : ApiV1IssueTrackersSkillTypeTypeGetQueryParamPagesizeNegativeNumber - Project : projecttesting20 Job : uat 1 Env : uat Region : US_WEST Result : fail Status Code : 404 Headers : {X-Content-Type-Options=[nosniff], X-XSS-Protection=[1; mode=block], Cache-Control=[no-cache, no-store, max-age=0, must-revalidate], Pragma=[no-cache], Expires=[0], X-Frame-Options=[DENY], Set-Cookie=[SESSION=ODkyMTdmOTktYmQ2Yy00OWQ1LTk3NzktODk5Njg4ZjMyOTA2; Path=/; HttpOnly], Content-Type=[application/json;charset=UTF-8], Transfer-Encoding=[chunked], Date=[Tue, 20 Nov 2018 06:20:00 GMT]} Endpoint : http://13.56.210.25/api/v1/api/v1/issue-trackers/skill-type/cInFBrdp?pageSize=-1 Request : Response : { "timestamp" : "2018-11-20T06:20:00.454+0000", "status" : 404, "error" : "Not Found", "message" : "No message available", "path" : "/api/v1/api/v1/issue-trackers/skill-type/cInFBrdp" } Logs : Assertion [@StatusCode != 401] resolved-to [404 != 401] result [Passed]Assertion [@StatusCode != 404] resolved-to [404 != 404] result [Failed] --- FX Bot ---
non_priority
project job uat env uat region us west result fail status code headers x content type options x xss protection cache control pragma expires x frame options set cookie content type transfer encoding date endpoint request response timestamp status error not found message no message available path api api issue trackers skill type cinfbrdp logs assertion resolved to result assertion resolved to result fx bot
0
52,871
6,284,460,694
IssuesEvent
2017-07-19 07:50:23
manchesergit/material-ui
https://api.github.com/repos/manchesergit/material-ui
opened
Test Avatar ID generation
unit testing
Tests need to be added to prove that Avatar [ ] produces a unique ID for itself if none is given [ ] uses the ID given in the properties
1.0
Test Avatar ID generation - Tests need to be added to prove that Avatar [ ] produces a unique ID for itself if none is given [ ] uses the ID given in the properties
non_priority
test avatar id generation tests need to be added to prove that avatar produces a unique id for itself if none is given uses the id given in the properties
0
64,034
8,706,838,979
IssuesEvent
2018-12-06 04:58:55
BrowseHandsfree/handsfreeJS
https://api.github.com/repos/BrowseHandsfree/handsfreeJS
closed
Settings API
✨ enhancement 📖 Documentation 🔌 Plugin
Let's add in a settings API, which will allow people to run Handsfree.js on low-powered devices (or take advantage of beefier ones). This will also enable multi-tracking support and more **Settings Route** - [x] Create a `/settings` route. This route will be reused at browsehandsfree.com - [x] Add FPS checker for benchmarking settings - [x] Configure settings on instantiation with `new Handsfree({settings: {}})` - ~~Create a Dat.gui plugin to be used in Glitches and forked projects~~ - ~~Unit test~~ Edit: We'll do this in another story **Settings:** - [x] Mouse sensitivity - [x] Click sensitivity - [x] setNumFacesToTrack
1.0
Settings API - Let's add in a settings API, which will allow people to run Handsfree.js on low-powered devices (or take advantage of beefier ones). This will also enable multi-tracking support and more **Settings Route** - [x] Create a `/settings` route. This route will be reused at browsehandsfree.com - [x] Add FPS checker for benchmarking settings - [x] Configure settings on instantiation with `new Handsfree({settings: {}})` - ~~Create a Dat.gui plugin to be used in Glitches and forked projects~~ - ~~Unit test~~ Edit: We'll do this in another story **Settings:** - [x] Mouse sensitivity - [x] Click sensitivity - [x] setNumFacesToTrack
non_priority
settings api let s add in a settings api which will allow people to run handsfree js on low powered devices or take advantage of beefier ones this will also enable multi tracking support and more settings route create a settings route this route will be reused at browsehandsfree com add fps checker for benchmarking settings configure settings on instantiation with new handsfree settings create a dat gui plugin to be used in glitches and forked projects unit test edit we ll do this in another story settings mouse sensitivity click sensitivity setnumfacestotrack
0
22,145
11,494,905,042
IssuesEvent
2020-02-12 03:04:07
melanchall/drywetmidi
https://api.github.com/repos/melanchall/drywetmidi
closed
Parsing performance
performance
I seem to be getting slow results when parsing. Midi file with 14,000 events: `GetTempoMap() = 140-270ms ` `GetNotes() = 200-300ms` `GetTimedEvents() + TimeAs() = 180-322ms` ``` foreach (TimedEvent e in midi.GetTimedEvents()) { realtime = e.TimeAs<MetricTimeSpan>(tempoMap).TotalMicroseconds / 1000000f } ``` Running on Unity + i7 3770. Any thoughts? midi file: [midi.zip](https://github.com/melanchall/drywetmidi/files/4070374/midi.zip)
True
Parsing performance - I seem to be getting slow results when parsing. Midi file with 14,000 events: `GetTempoMap() = 140-270ms ` `GetNotes() = 200-300ms` `GetTimedEvents() + TimeAs() = 180-322ms` ``` foreach (TimedEvent e in midi.GetTimedEvents()) { realtime = e.TimeAs<MetricTimeSpan>(tempoMap).TotalMicroseconds / 1000000f } ``` Running on Unity + i7 3770. Any thoughts? midi file: [midi.zip](https://github.com/melanchall/drywetmidi/files/4070374/midi.zip)
non_priority
parsing performance i seem to be getting slow results when parsing midi file with events gettempomap getnotes gettimedevents timeas foreach timedevent e in midi gettimedevents realtime e timeas tempomap totalmicroseconds running on unity any thoughts midi file
0
32,281
12,102,277,258
IssuesEvent
2020-04-20 16:26:23
Hyraze/infinite
https://api.github.com/repos/Hyraze/infinite
opened
WS-2019-0063 (High) detected in js-yaml-3.7.0.tgz, js-yaml-3.12.1.tgz
security vulnerability
## WS-2019-0063 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>js-yaml-3.7.0.tgz</b>, <b>js-yaml-3.12.1.tgz</b></p></summary> <p> <details><summary><b>js-yaml-3.7.0.tgz</b></p></summary> <p>YAML 1.2 parser and serializer</p> <p>Library home page: <a href="https://registry.npmjs.org/js-yaml/-/js-yaml-3.7.0.tgz">https://registry.npmjs.org/js-yaml/-/js-yaml-3.7.0.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/infinite/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/infinite/node_modules/htmlnano/node_modules/js-yaml/package.json</p> <p> Dependency Hierarchy: - parcel-bundler-1.11.0.tgz (Root Library) - htmlnano-0.1.10.tgz - cssnano-3.10.0.tgz - postcss-svgo-2.1.6.tgz - svgo-0.7.2.tgz - :x: **js-yaml-3.7.0.tgz** (Vulnerable Library) </details> <details><summary><b>js-yaml-3.12.1.tgz</b></p></summary> <p>YAML 1.2 parser and serializer</p> <p>Library home page: <a href="https://registry.npmjs.org/js-yaml/-/js-yaml-3.12.1.tgz">https://registry.npmjs.org/js-yaml/-/js-yaml-3.12.1.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/infinite/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/infinite/node_modules/js-yaml/package.json</p> <p> Dependency Hierarchy: - parcel-bundler-1.11.0.tgz (Root Library) - :x: **js-yaml-3.12.1.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://api.github.com/repos/Hyraze/infinite/commits/f686a0f9119ce1b31715bd19e5a2f4705af80098">f686a0f9119ce1b31715bd19e5a2f4705af80098</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Js-yaml prior to 3.13.1 are vulnerable to Code Injection. The load() function may execute arbitrary code injected through a malicious YAML file. <p>Publish Date: 2019-04-30 <p>URL: <a href=https://github.com/nodeca/js-yaml/pull/480>WS-2019-0063</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>8.0</b>)</summary> <p> Base Score Metrics not available</p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/advisories/813">https://www.npmjs.com/advisories/813</a></p> <p>Release Date: 2019-04-30</p> <p>Fix Resolution: 3.13.1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
WS-2019-0063 (High) detected in js-yaml-3.7.0.tgz, js-yaml-3.12.1.tgz - ## WS-2019-0063 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>js-yaml-3.7.0.tgz</b>, <b>js-yaml-3.12.1.tgz</b></p></summary> <p> <details><summary><b>js-yaml-3.7.0.tgz</b></p></summary> <p>YAML 1.2 parser and serializer</p> <p>Library home page: <a href="https://registry.npmjs.org/js-yaml/-/js-yaml-3.7.0.tgz">https://registry.npmjs.org/js-yaml/-/js-yaml-3.7.0.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/infinite/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/infinite/node_modules/htmlnano/node_modules/js-yaml/package.json</p> <p> Dependency Hierarchy: - parcel-bundler-1.11.0.tgz (Root Library) - htmlnano-0.1.10.tgz - cssnano-3.10.0.tgz - postcss-svgo-2.1.6.tgz - svgo-0.7.2.tgz - :x: **js-yaml-3.7.0.tgz** (Vulnerable Library) </details> <details><summary><b>js-yaml-3.12.1.tgz</b></p></summary> <p>YAML 1.2 parser and serializer</p> <p>Library home page: <a href="https://registry.npmjs.org/js-yaml/-/js-yaml-3.12.1.tgz">https://registry.npmjs.org/js-yaml/-/js-yaml-3.12.1.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/infinite/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/infinite/node_modules/js-yaml/package.json</p> <p> Dependency Hierarchy: - parcel-bundler-1.11.0.tgz (Root Library) - :x: **js-yaml-3.12.1.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://api.github.com/repos/Hyraze/infinite/commits/f686a0f9119ce1b31715bd19e5a2f4705af80098">f686a0f9119ce1b31715bd19e5a2f4705af80098</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Js-yaml prior to 3.13.1 are vulnerable to Code Injection. The load() function may execute arbitrary code injected through a malicious YAML file. <p>Publish Date: 2019-04-30 <p>URL: <a href=https://github.com/nodeca/js-yaml/pull/480>WS-2019-0063</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>8.0</b>)</summary> <p> Base Score Metrics not available</p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/advisories/813">https://www.npmjs.com/advisories/813</a></p> <p>Release Date: 2019-04-30</p> <p>Fix Resolution: 3.13.1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
ws high detected in js yaml tgz js yaml tgz ws high severity vulnerability vulnerable libraries js yaml tgz js yaml tgz js yaml tgz yaml parser and serializer library home page a href path to dependency file tmp ws scm infinite package json path to vulnerable library tmp ws scm infinite node modules htmlnano node modules js yaml package json dependency hierarchy parcel bundler tgz root library htmlnano tgz cssnano tgz postcss svgo tgz svgo tgz x js yaml tgz vulnerable library js yaml tgz yaml parser and serializer library home page a href path to dependency file tmp ws scm infinite package json path to vulnerable library tmp ws scm infinite node modules js yaml package json dependency hierarchy parcel bundler tgz root library x js yaml tgz vulnerable library found in head commit a href vulnerability details js yaml prior to are vulnerable to code injection the load function may execute arbitrary code injected through a malicious yaml file publish date url a href cvss score details base score metrics not available suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
310,914
26,753,718,910
IssuesEvent
2023-01-30 21:53:00
elastic/kibana
https://api.github.com/repos/elastic/kibana
opened
Failing test: Plugin Functional Tests.test/plugin_functional/test_suites/saved_objects_management/visible_in_management·ts - Saved Objects Management types with `visibleInManagement` "before all" hook in "types with `visibleInManagement` "
failed-test
A test failed on a tracked branch ``` Error: Forcing mocha to abort at Object.next (node_modules/@kbn/test/target_node/functional_test_runner/lib/mocha/run_tests.js:42:25) at SafeSubscriber.__tryOrUnsub (node_modules/rxjs/src/internal/Subscriber.ts:265:10) at SafeSubscriber.next (node_modules/rxjs/src/internal/Subscriber.ts:207:14) at Subscriber._next (node_modules/rxjs/src/internal/Subscriber.ts:139:22) at Subscriber.next (node_modules/rxjs/src/internal/Subscriber.ts:99:12) at RaceSubscriber.notifyNext (node_modules/rxjs/src/internal/observable/race.ts:137:22) at InnerSubscriber._next (node_modules/rxjs/src/internal/InnerSubscriber.ts:17:17) at InnerSubscriber.Subscriber.next (node_modules/rxjs/src/internal/Subscriber.ts:99:12) at TakeSubscriber._next (node_modules/rxjs/src/internal/operators/take.ts:92:24) at TakeSubscriber.Subscriber.next (node_modules/rxjs/src/internal/Subscriber.ts:99:12) at AbortSignal.handler (node_modules/rxjs/src/internal/observable/fromEvent.ts:201:20) at AbortSignal.[nodejs.internal.kHybridDispatch] (node:internal/event_target:736:20) at AbortSignal.dispatchEvent (node:internal/event_target:678:26) at abortSignal (node:internal/abort_controller:292:10) at AbortController.abort (node:internal/abort_controller:323:5) at onEarlyExit (node_modules/@kbn/test/target_node/functional_tests/tasks.js:112:21) { uncaught: true } ``` First failure: [CI Build - 7.17](https://buildkite.com/elastic/kibana-on-merge/builds/26206#0186047c-8d8f-4ee6-a1b5-626689996e48) <!-- kibanaCiData = {"failed-test":{"test.class":"Plugin Functional Tests.test/plugin_functional/test_suites/saved_objects_management/visible_in_management·ts","test.name":"Saved Objects Management types with `visibleInManagement` \"before all\" hook in \"types with `visibleInManagement` \"","test.failCount":1}} -->
1.0
Failing test: Plugin Functional Tests.test/plugin_functional/test_suites/saved_objects_management/visible_in_management·ts - Saved Objects Management types with `visibleInManagement` "before all" hook in "types with `visibleInManagement` " - A test failed on a tracked branch ``` Error: Forcing mocha to abort at Object.next (node_modules/@kbn/test/target_node/functional_test_runner/lib/mocha/run_tests.js:42:25) at SafeSubscriber.__tryOrUnsub (node_modules/rxjs/src/internal/Subscriber.ts:265:10) at SafeSubscriber.next (node_modules/rxjs/src/internal/Subscriber.ts:207:14) at Subscriber._next (node_modules/rxjs/src/internal/Subscriber.ts:139:22) at Subscriber.next (node_modules/rxjs/src/internal/Subscriber.ts:99:12) at RaceSubscriber.notifyNext (node_modules/rxjs/src/internal/observable/race.ts:137:22) at InnerSubscriber._next (node_modules/rxjs/src/internal/InnerSubscriber.ts:17:17) at InnerSubscriber.Subscriber.next (node_modules/rxjs/src/internal/Subscriber.ts:99:12) at TakeSubscriber._next (node_modules/rxjs/src/internal/operators/take.ts:92:24) at TakeSubscriber.Subscriber.next (node_modules/rxjs/src/internal/Subscriber.ts:99:12) at AbortSignal.handler (node_modules/rxjs/src/internal/observable/fromEvent.ts:201:20) at AbortSignal.[nodejs.internal.kHybridDispatch] (node:internal/event_target:736:20) at AbortSignal.dispatchEvent (node:internal/event_target:678:26) at abortSignal (node:internal/abort_controller:292:10) at AbortController.abort (node:internal/abort_controller:323:5) at onEarlyExit (node_modules/@kbn/test/target_node/functional_tests/tasks.js:112:21) { uncaught: true } ``` First failure: [CI Build - 7.17](https://buildkite.com/elastic/kibana-on-merge/builds/26206#0186047c-8d8f-4ee6-a1b5-626689996e48) <!-- kibanaCiData = {"failed-test":{"test.class":"Plugin Functional Tests.test/plugin_functional/test_suites/saved_objects_management/visible_in_management·ts","test.name":"Saved Objects Management types with `visibleInManagement` \"before all\" hook in \"types with `visibleInManagement` \"","test.failCount":1}} -->
non_priority
failing test plugin functional tests test plugin functional test suites saved objects management visible in management·ts saved objects management types with visibleinmanagement before all hook in types with visibleinmanagement a test failed on a tracked branch error forcing mocha to abort at object next node modules kbn test target node functional test runner lib mocha run tests js at safesubscriber tryorunsub node modules rxjs src internal subscriber ts at safesubscriber next node modules rxjs src internal subscriber ts at subscriber next node modules rxjs src internal subscriber ts at subscriber next node modules rxjs src internal subscriber ts at racesubscriber notifynext node modules rxjs src internal observable race ts at innersubscriber next node modules rxjs src internal innersubscriber ts at innersubscriber subscriber next node modules rxjs src internal subscriber ts at takesubscriber next node modules rxjs src internal operators take ts at takesubscriber subscriber next node modules rxjs src internal subscriber ts at abortsignal handler node modules rxjs src internal observable fromevent ts at abortsignal node internal event target at abortsignal dispatchevent node internal event target at abortsignal node internal abort controller at abortcontroller abort node internal abort controller at onearlyexit node modules kbn test target node functional tests tasks js uncaught true first failure
0
41,102
6,891,241,217
IssuesEvent
2017-11-22 16:26:09
rkt/rkt
https://api.github.com/repos/rkt/rkt
closed
run/volume: please document recursive=<bool> flag
area/usability component/stage0 kind/documentation low hanging fruit
We run `rkt` on a host with a lot of automount points (1000 or so). When using stage1-coreos, we could simply mount the parent directory into a pod, and have the automounter on the host resolve requests from the pod. This was great. Having switched to stage1-fly (because of #3639), we see that submounts of parent mounted on the host are not visible in the pod. Which is, for us, a showstopper. Is there a work-around? (Otherwise we'll have to abandon our use of stage1-fly, and revert to work-arounds for #3639.) **Environment** ``` rkt Version: 1.26.0 appc Version: 0.8.10 Go Version: go1.7.4 Go OS/Arch: linux/amd64 Features: -TPM +SDJOURNAL -- Linux 4.4.65-1.el7.elrepo.x86_64 x86_64 -- NAME="CentOS Linux" VERSION="7 (Core)" ID="centos" ID_LIKE="rhel fedora" VERSION_ID="7" PRETTY_NAME="CentOS Linux 7 (Core)" ANSI_COLOR="0;31" CPE_NAME="cpe:/o:centos:centos:7" HOME_URL="https://www.centos.org/" BUG_REPORT_URL="https://bugs.centos.org/" CENTOS_MANTISBT_PROJECT="CentOS-7" CENTOS_MANTISBT_PROJECT_VERSION="7" REDHAT_SUPPORT_PRODUCT="centos" REDHAT_SUPPORT_PRODUCT_VERSION="7" -- systemd 219 +PAM +AUDIT +SELINUX +IMA -APPARMOR +SMACK +SYSVINIT +UTMP +LIBCRYPTSETUP +GCRYPT +GNUTLS +ACL +XZ -LZ4 -SECCOMP +BLKID +ELFUTILS +KMOD +IDN ``` **What did you do?** Note automounter has already mounted required directory on host: ``` inscrutable# df | grep bioinformatics_dev ignition:/z201/active/bioinformatics_dev 1485973504 15675392 1470298112 2% /bifo/active/bioinformatics_dev ``` Example with default coreos stage1, works fine: ``` inscrutable# /usr/bin/rkt --insecure-options=image run --volume bifo,kind=host,source=/bifo quay.io/coreos/alpine-sh --mount volume=bifo,target=/bifo --exec /bin/sh -- -c 'ls /bifo/active/bioinformatics_dev' [3702827.331161] alpine-sh[5]: BBMap [3702827.331441] alpine-sh[5]: BGPA [3702827.331659] alpine-sh[5]: Boost [3702827.331879] alpine-sh[5]: GBSX inscrutable# ``` Example with fly stage1, doesn't see submount: ``` inscrutable# /usr/bin/rkt --insecure-options=image run --volume bifo,kind=host,source=/bifo quay.io/coreos/alpine-sh --mount volume=bifo,target=/bifo --stage1-name=coreos.com/rkt/stage1-fly:1.26.0 --exec /bin/sh -- -c 'ls /bifo/active/bioinformatics_dev' ls: /bifo/active/bioinformatics_dev: No such file or directory ``` **What did you expect to see?** Similar output from fly stage1 as for default coreos stage1 **What did you see instead?** Failed to access mounted subdirectory. Is there a way to get stage1-fly to see these submounts?
1.0
run/volume: please document recursive=<bool> flag - We run `rkt` on a host with a lot of automount points (1000 or so). When using stage1-coreos, we could simply mount the parent directory into a pod, and have the automounter on the host resolve requests from the pod. This was great. Having switched to stage1-fly (because of #3639), we see that submounts of parent mounted on the host are not visible in the pod. Which is, for us, a showstopper. Is there a work-around? (Otherwise we'll have to abandon our use of stage1-fly, and revert to work-arounds for #3639.) **Environment** ``` rkt Version: 1.26.0 appc Version: 0.8.10 Go Version: go1.7.4 Go OS/Arch: linux/amd64 Features: -TPM +SDJOURNAL -- Linux 4.4.65-1.el7.elrepo.x86_64 x86_64 -- NAME="CentOS Linux" VERSION="7 (Core)" ID="centos" ID_LIKE="rhel fedora" VERSION_ID="7" PRETTY_NAME="CentOS Linux 7 (Core)" ANSI_COLOR="0;31" CPE_NAME="cpe:/o:centos:centos:7" HOME_URL="https://www.centos.org/" BUG_REPORT_URL="https://bugs.centos.org/" CENTOS_MANTISBT_PROJECT="CentOS-7" CENTOS_MANTISBT_PROJECT_VERSION="7" REDHAT_SUPPORT_PRODUCT="centos" REDHAT_SUPPORT_PRODUCT_VERSION="7" -- systemd 219 +PAM +AUDIT +SELINUX +IMA -APPARMOR +SMACK +SYSVINIT +UTMP +LIBCRYPTSETUP +GCRYPT +GNUTLS +ACL +XZ -LZ4 -SECCOMP +BLKID +ELFUTILS +KMOD +IDN ``` **What did you do?** Note automounter has already mounted required directory on host: ``` inscrutable# df | grep bioinformatics_dev ignition:/z201/active/bioinformatics_dev 1485973504 15675392 1470298112 2% /bifo/active/bioinformatics_dev ``` Example with default coreos stage1, works fine: ``` inscrutable# /usr/bin/rkt --insecure-options=image run --volume bifo,kind=host,source=/bifo quay.io/coreos/alpine-sh --mount volume=bifo,target=/bifo --exec /bin/sh -- -c 'ls /bifo/active/bioinformatics_dev' [3702827.331161] alpine-sh[5]: BBMap [3702827.331441] alpine-sh[5]: BGPA [3702827.331659] alpine-sh[5]: Boost [3702827.331879] alpine-sh[5]: GBSX inscrutable# ``` Example with fly stage1, doesn't see submount: ``` inscrutable# /usr/bin/rkt --insecure-options=image run --volume bifo,kind=host,source=/bifo quay.io/coreos/alpine-sh --mount volume=bifo,target=/bifo --stage1-name=coreos.com/rkt/stage1-fly:1.26.0 --exec /bin/sh -- -c 'ls /bifo/active/bioinformatics_dev' ls: /bifo/active/bioinformatics_dev: No such file or directory ``` **What did you expect to see?** Similar output from fly stage1 as for default coreos stage1 **What did you see instead?** Failed to access mounted subdirectory. Is there a way to get stage1-fly to see these submounts?
non_priority
run volume please document recursive flag we run rkt on a host with a lot of automount points or so when using coreos we could simply mount the parent directory into a pod and have the automounter on the host resolve requests from the pod this was great having switched to fly because of we see that submounts of parent mounted on the host are not visible in the pod which is for us a showstopper is there a work around otherwise we ll have to abandon our use of fly and revert to work arounds for environment rkt version appc version go version go os arch linux features tpm sdjournal linux elrepo name centos linux version core id centos id like rhel fedora version id pretty name centos linux core ansi color cpe name cpe o centos centos home url bug report url centos mantisbt project centos centos mantisbt project version redhat support product centos redhat support product version systemd pam audit selinux ima apparmor smack sysvinit utmp libcryptsetup gcrypt gnutls acl xz seccomp blkid elfutils kmod idn what did you do note automounter has already mounted required directory on host inscrutable df grep bioinformatics dev ignition active bioinformatics dev bifo active bioinformatics dev example with default coreos works fine inscrutable usr bin rkt insecure options image run volume bifo kind host source bifo quay io coreos alpine sh mount volume bifo target bifo exec bin sh c ls bifo active bioinformatics dev alpine sh bbmap alpine sh bgpa alpine sh boost alpine sh gbsx inscrutable example with fly doesn t see submount inscrutable usr bin rkt insecure options image run volume bifo kind host source bifo quay io coreos alpine sh mount volume bifo target bifo name coreos com rkt fly exec bin sh c ls bifo active bioinformatics dev ls bifo active bioinformatics dev no such file or directory what did you expect to see similar output from fly as for default coreos what did you see instead failed to access mounted subdirectory is there a way to get fly to see these submounts
0
75,107
9,201,885,633
IssuesEvent
2019-03-07 20:51:19
open-apparel-registry/open-apparel-registry
https://api.github.com/repos/open-apparel-registry/open-apparel-registry
closed
Design review of the facility matching page
design tested/verified
## Overview Logged in users can upload a CSV facility list at /contribute and that data is programmatically matched to a master list of facilities. Errors and uncertainties in that matching process are shown in a table view. Review the table view interface and make suggestions to improve the organization and usability of this page. <img width="1232" alt="screen shot 2019-03-06 at 10 25 46 am" src="https://user-images.githubusercontent.com/17363/53901262-cd95d280-3ffb-11e9-9b94-e9146c531a49.png"> <img width="1232" alt="screen shot 2019-03-06 at 10 26 07 am" src="https://user-images.githubusercontent.com/17363/53901269-d4244a00-3ffb-11e9-8dee-711dcf15e1a6.png"> ### Steps to populate the table view - `vagrant ssh` - `./scripts/manage resetdb` - Browse http://localhost:6543/auth/register and register an account - Log in - Upload `⁨src⁩/django⁩/api⁩/management⁩/commands⁩/facility_lists⁩/13.csv` via http://localhost:6543/contribute - On the vagrant VM, run commands to fully process the CSV - ./scripts/manage batch_process --list-id 15 --action parse - ./scripts/manage batch_process --list-id 15 --action geocode - ./scripts/manage batch_process --list-id 15 --action match - Browse the list at http://localhost:6543/lists/15
1.0
Design review of the facility matching page - ## Overview Logged in users can upload a CSV facility list at /contribute and that data is programmatically matched to a master list of facilities. Errors and uncertainties in that matching process are shown in a table view. Review the table view interface and make suggestions to improve the organization and usability of this page. <img width="1232" alt="screen shot 2019-03-06 at 10 25 46 am" src="https://user-images.githubusercontent.com/17363/53901262-cd95d280-3ffb-11e9-9b94-e9146c531a49.png"> <img width="1232" alt="screen shot 2019-03-06 at 10 26 07 am" src="https://user-images.githubusercontent.com/17363/53901269-d4244a00-3ffb-11e9-8dee-711dcf15e1a6.png"> ### Steps to populate the table view - `vagrant ssh` - `./scripts/manage resetdb` - Browse http://localhost:6543/auth/register and register an account - Log in - Upload `⁨src⁩/django⁩/api⁩/management⁩/commands⁩/facility_lists⁩/13.csv` via http://localhost:6543/contribute - On the vagrant VM, run commands to fully process the CSV - ./scripts/manage batch_process --list-id 15 --action parse - ./scripts/manage batch_process --list-id 15 --action geocode - ./scripts/manage batch_process --list-id 15 --action match - Browse the list at http://localhost:6543/lists/15
non_priority
design review of the facility matching page overview logged in users can upload a csv facility list at contribute and that data is programmatically matched to a master list of facilities errors and uncertainties in that matching process are shown in a table view review the table view interface and make suggestions to improve the organization and usability of this page img width alt screen shot at am src img width alt screen shot at am src steps to populate the table view vagrant ssh scripts manage resetdb browse and register an account log in upload ⁨src⁩ django⁩ api⁩ management⁩ commands⁩ facility lists⁩ csv via on the vagrant vm run commands to fully process the csv scripts manage batch process list id action parse scripts manage batch process list id action geocode scripts manage batch process list id action match browse the list at
0
16,982
9,958,511,900
IssuesEvent
2019-07-05 21:30:37
n-psk/reactIOTEAU
https://api.github.com/repos/n-psk/reactIOTEAU
opened
WS-2019-0040 (Medium) detected in highcharts-5.0.15.tgz
security vulnerability
## WS-2019-0040 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>highcharts-5.0.15.tgz</b></p></summary> <p>JavaScript charting framework</p> <p>Library home page: <a href="https://registry.npmjs.org/highcharts/-/highcharts-5.0.15.tgz">https://registry.npmjs.org/highcharts/-/highcharts-5.0.15.tgz</a></p> <p>Path to dependency file: /reactIOTEAU/IOT-v0.2/package.json</p> <p>Path to vulnerable library: /reactIOTEAU/IOT-v0.2/node_modules/highcharts/package.json,/reactIOTEAU/IOT-v0.2/node_modules/highcharts/package.json</p> <p> Dependency Hierarchy: - :x: **highcharts-5.0.15.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://api.github.com/repos/n-psk/reactIOTEAU/commits/0042d14804cb7211d33e78b48b4ef637a69bb1f3">0042d14804cb7211d33e78b48b4ef637a69bb1f3</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Versions of highcharts prior to 6.1.0 are vulnerable to Regular Expression Denial of Service (ReDoS). Untrusted input may cause catastrophic backtracking while matching regular expressions. <p>Publish Date: 2019-04-05 <p>URL: <a href=https://github.com/highcharts/highcharts/commit/7c547e1e0f5e4379f94396efd559a566668c0dfa>WS-2019-0040</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>5.0</b>)</summary> <p> Base Score Metrics not available</p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/advisories/793">https://www.npmjs.com/advisories/793</a></p> <p>Release Date: 2019-04-05</p> <p>Fix Resolution: 6.1.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
WS-2019-0040 (Medium) detected in highcharts-5.0.15.tgz - ## WS-2019-0040 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>highcharts-5.0.15.tgz</b></p></summary> <p>JavaScript charting framework</p> <p>Library home page: <a href="https://registry.npmjs.org/highcharts/-/highcharts-5.0.15.tgz">https://registry.npmjs.org/highcharts/-/highcharts-5.0.15.tgz</a></p> <p>Path to dependency file: /reactIOTEAU/IOT-v0.2/package.json</p> <p>Path to vulnerable library: /reactIOTEAU/IOT-v0.2/node_modules/highcharts/package.json,/reactIOTEAU/IOT-v0.2/node_modules/highcharts/package.json</p> <p> Dependency Hierarchy: - :x: **highcharts-5.0.15.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://api.github.com/repos/n-psk/reactIOTEAU/commits/0042d14804cb7211d33e78b48b4ef637a69bb1f3">0042d14804cb7211d33e78b48b4ef637a69bb1f3</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Versions of highcharts prior to 6.1.0 are vulnerable to Regular Expression Denial of Service (ReDoS). Untrusted input may cause catastrophic backtracking while matching regular expressions. <p>Publish Date: 2019-04-05 <p>URL: <a href=https://github.com/highcharts/highcharts/commit/7c547e1e0f5e4379f94396efd559a566668c0dfa>WS-2019-0040</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>5.0</b>)</summary> <p> Base Score Metrics not available</p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/advisories/793">https://www.npmjs.com/advisories/793</a></p> <p>Release Date: 2019-04-05</p> <p>Fix Resolution: 6.1.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
ws medium detected in highcharts tgz ws medium severity vulnerability vulnerable library highcharts tgz javascript charting framework library home page a href path to dependency file reactioteau iot package json path to vulnerable library reactioteau iot node modules highcharts package json reactioteau iot node modules highcharts package json dependency hierarchy x highcharts tgz vulnerable library found in head commit a href vulnerability details versions of highcharts prior to are vulnerable to regular expression denial of service redos untrusted input may cause catastrophic backtracking while matching regular expressions publish date url a href cvss score details base score metrics not available suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
19,917
10,430,974,064
IssuesEvent
2019-09-17 08:06:06
hapijs/iron
https://api.github.com/repos/hapijs/iron
closed
Exposing PBKDF2 hashing algorithm for key generation, or just upgrading it
enhancement security
I was glancing through Iron and I noticed that there was a slight mismatch between the minimum password length and the key derivation method, namely the SHA-1 hashing algorithm used inside PBKDF2. This post explains it pretty concisely I think (https://www.chosenplaintext.ca/2015/10/08/pbkdf2-design-flaw.html). The TL:DR is that by using a password longer than the 20 bytes that SHA-1 outputs, pbkdf2 is doing twice the amount of iterations for little, if no benefit. All I am proposing is to change the digest option used in pbkdf2 in the generateKey() function to sha256 at least, to use all 32 bytes meaningfully. I realize this would break existing implementations, so exposing it as an option would also be fine. I'm willing to write a pull request to do so, just wanted to put my thoughts out there first so someone else could point out any flaws. Also this is just a question, but why we are using PBKDF2 at all? Is there a need for multiple passes for this use case? As long as we are applying a salt shouldn't just HMAC-SHA be fine?
True
Exposing PBKDF2 hashing algorithm for key generation, or just upgrading it - I was glancing through Iron and I noticed that there was a slight mismatch between the minimum password length and the key derivation method, namely the SHA-1 hashing algorithm used inside PBKDF2. This post explains it pretty concisely I think (https://www.chosenplaintext.ca/2015/10/08/pbkdf2-design-flaw.html). The TL:DR is that by using a password longer than the 20 bytes that SHA-1 outputs, pbkdf2 is doing twice the amount of iterations for little, if no benefit. All I am proposing is to change the digest option used in pbkdf2 in the generateKey() function to sha256 at least, to use all 32 bytes meaningfully. I realize this would break existing implementations, so exposing it as an option would also be fine. I'm willing to write a pull request to do so, just wanted to put my thoughts out there first so someone else could point out any flaws. Also this is just a question, but why we are using PBKDF2 at all? Is there a need for multiple passes for this use case? As long as we are applying a salt shouldn't just HMAC-SHA be fine?
non_priority
exposing hashing algorithm for key generation or just upgrading it i was glancing through iron and i noticed that there was a slight mismatch between the minimum password length and the key derivation method namely the sha hashing algorithm used inside this post explains it pretty concisely i think the tl dr is that by using a password longer than the bytes that sha outputs is doing twice the amount of iterations for little if no benefit all i am proposing is to change the digest option used in in the generatekey function to at least to use all bytes meaningfully i realize this would break existing implementations so exposing it as an option would also be fine i m willing to write a pull request to do so just wanted to put my thoughts out there first so someone else could point out any flaws also this is just a question but why we are using at all is there a need for multiple passes for this use case as long as we are applying a salt shouldn t just hmac sha be fine
0
108,852
23,671,728,150
IssuesEvent
2022-08-27 13:10:31
kiwiproject/kiwi-test
https://api.github.com/repos/kiwiproject/kiwi-test
closed
Can we remove the dependency on commons-io from H2FileBasedDatabaseExtension?
investigation code cleanup
It is only required because the `H2FileBasedDatabaseExtension` uses `FileUtils.deleteDirectory` to recursively delete the H2 database directly. If we can find a JDK (or even Guava) alternative, then we can remove the `commons-io` dependency entirely since this is the only place `kiwi-test` uses anything from it.
1.0
Can we remove the dependency on commons-io from H2FileBasedDatabaseExtension? - It is only required because the `H2FileBasedDatabaseExtension` uses `FileUtils.deleteDirectory` to recursively delete the H2 database directly. If we can find a JDK (or even Guava) alternative, then we can remove the `commons-io` dependency entirely since this is the only place `kiwi-test` uses anything from it.
non_priority
can we remove the dependency on commons io from it is only required because the uses fileutils deletedirectory to recursively delete the database directly if we can find a jdk or even guava alternative then we can remove the commons io dependency entirely since this is the only place kiwi test uses anything from it
0
7,928
8,124,120,793
IssuesEvent
2018-08-16 16:29:24
Microsoft/visualfsharp
https://api.github.com/repos/Microsoft/visualfsharp
closed
Rename Feature Corrupts Unsaved Files in VS2017 15.7.1
Area-IDE Language Service Urgency-Soon
When you rename a symbol that exists in another file that is open with pending changes, the rename operation is computed using the character positions of the _unsaved_ file. This means if you've added _any_ lines or changed target symbol positions in the target files, the replace operation will overwrite any text that existed at the old offsets. UPDATE: While writing this issue I have now also encountered the crashing issues when renaming symbols added and used within the same unsaved file. (seems related to #4655 and #2204). #### Repro steps 1. Open a source file which contains a symbol that is defined in another source file. ![image](https://user-images.githubusercontent.com/6778687/40149957-d8b4a220-5944-11e8-91b5-ddb6bf939200.png) 2. Add a few lines of code _above_ where that symbol is used. **DO NOT SAVE YET** ![image](https://user-images.githubusercontent.com/6778687/40149992-0de3eba4-5945-11e8-949d-62e936c26571.png) 3. Go to the definition of that symbol in the other file (F12). and use the Rename feature (Ctrl+R+R) to rename that symbol. ![image](https://user-images.githubusercontent.com/6778687/40150041-55599538-5945-11e8-8f2d-a6f2f23018cb.png) 4. The Rename operation overwrites code above where the actual symbols were used and saves the file, corrupting the source code. ![image](https://user-images.githubusercontent.com/6778687/40150051-6225d290-5945-11e8-8199-355fe70f3ed7.png) #### Bonus Content Interestingly, I tried it again with Preview Changes enabled, and the resulting preview window actually shows the corruption: ![image](https://user-images.githubusercontent.com/6778687/40150656-de586924-5948-11e8-9558-387a3e6e85df.png) #### Repro Solution ZIP [VS2017.15.7.1-BlindRenameOffsetIssue.zip](https://github.com/Microsoft/visualfsharp/files/2011226/VS2017.15.7.1-BlindRenameOffsetIssue.zip) #### Expected behavior Rename feature properly renames usages in open / modified files. #### Actual behavior Rename feature uses old buffer to calculate rename operations, overwriting current buffer and saving the file. #### Known workarounds Only to save all open files before performing any rename operations. #### Related information Provide any related information * Operating system * Windows 10, Version 1709 (16299.309) * Branch * 15.7.1 public release * .NET Runtime, CoreCLR or Mono Version * .NET Framework 4.7.1 * Editing Tools (e.g. Visual Studio Version) * Visual Studio 15.7.1 * Indications of severity * This issue and the related Rename->VSCrash issues can cause data loss.
1.0
Rename Feature Corrupts Unsaved Files in VS2017 15.7.1 - When you rename a symbol that exists in another file that is open with pending changes, the rename operation is computed using the character positions of the _unsaved_ file. This means if you've added _any_ lines or changed target symbol positions in the target files, the replace operation will overwrite any text that existed at the old offsets. UPDATE: While writing this issue I have now also encountered the crashing issues when renaming symbols added and used within the same unsaved file. (seems related to #4655 and #2204). #### Repro steps 1. Open a source file which contains a symbol that is defined in another source file. ![image](https://user-images.githubusercontent.com/6778687/40149957-d8b4a220-5944-11e8-91b5-ddb6bf939200.png) 2. Add a few lines of code _above_ where that symbol is used. **DO NOT SAVE YET** ![image](https://user-images.githubusercontent.com/6778687/40149992-0de3eba4-5945-11e8-949d-62e936c26571.png) 3. Go to the definition of that symbol in the other file (F12). and use the Rename feature (Ctrl+R+R) to rename that symbol. ![image](https://user-images.githubusercontent.com/6778687/40150041-55599538-5945-11e8-8f2d-a6f2f23018cb.png) 4. The Rename operation overwrites code above where the actual symbols were used and saves the file, corrupting the source code. ![image](https://user-images.githubusercontent.com/6778687/40150051-6225d290-5945-11e8-8199-355fe70f3ed7.png) #### Bonus Content Interestingly, I tried it again with Preview Changes enabled, and the resulting preview window actually shows the corruption: ![image](https://user-images.githubusercontent.com/6778687/40150656-de586924-5948-11e8-9558-387a3e6e85df.png) #### Repro Solution ZIP [VS2017.15.7.1-BlindRenameOffsetIssue.zip](https://github.com/Microsoft/visualfsharp/files/2011226/VS2017.15.7.1-BlindRenameOffsetIssue.zip) #### Expected behavior Rename feature properly renames usages in open / modified files. #### Actual behavior Rename feature uses old buffer to calculate rename operations, overwriting current buffer and saving the file. #### Known workarounds Only to save all open files before performing any rename operations. #### Related information Provide any related information * Operating system * Windows 10, Version 1709 (16299.309) * Branch * 15.7.1 public release * .NET Runtime, CoreCLR or Mono Version * .NET Framework 4.7.1 * Editing Tools (e.g. Visual Studio Version) * Visual Studio 15.7.1 * Indications of severity * This issue and the related Rename->VSCrash issues can cause data loss.
non_priority
rename feature corrupts unsaved files in when you rename a symbol that exists in another file that is open with pending changes the rename operation is computed using the character positions of the unsaved file this means if you ve added any lines or changed target symbol positions in the target files the replace operation will overwrite any text that existed at the old offsets update while writing this issue i have now also encountered the crashing issues when renaming symbols added and used within the same unsaved file seems related to and repro steps open a source file which contains a symbol that is defined in another source file add a few lines of code above where that symbol is used do not save yet go to the definition of that symbol in the other file and use the rename feature ctrl r r to rename that symbol the rename operation overwrites code above where the actual symbols were used and saves the file corrupting the source code bonus content interestingly i tried it again with preview changes enabled and the resulting preview window actually shows the corruption repro solution zip expected behavior rename feature properly renames usages in open modified files actual behavior rename feature uses old buffer to calculate rename operations overwriting current buffer and saving the file known workarounds only to save all open files before performing any rename operations related information provide any related information operating system windows version branch public release net runtime coreclr or mono version net framework editing tools e g visual studio version visual studio indications of severity this issue and the related rename vscrash issues can cause data loss
0
152,821
19,697,598,591
IssuesEvent
2022-01-12 13:45:14
RG4421/mmRTLS
https://api.github.com/repos/RG4421/mmRTLS
closed
CVE-2021-35065 (Medium) detected in glob-parent-2.0.0.tgz, glob-parent-5.1.2.tgz - autoclosed
security vulnerability
## CVE-2021-35065 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>glob-parent-2.0.0.tgz</b>, <b>glob-parent-5.1.2.tgz</b></p></summary> <p> <details><summary><b>glob-parent-2.0.0.tgz</b></p></summary> <p>Strips glob magic from a string to provide the parent path</p> <p>Library home page: <a href="https://registry.npmjs.org/glob-parent/-/glob-parent-2.0.0.tgz">https://registry.npmjs.org/glob-parent/-/glob-parent-2.0.0.tgz</a></p> <p>Path to dependency file: /ctrlSrv/processor/package.json</p> <p>Path to vulnerable library: /ctrlSrv/processor/node_modules/glob-parent/package.json</p> <p> Dependency Hierarchy: - babel-cli-6.26.0.tgz (Root Library) - chokidar-1.7.0.tgz - :x: **glob-parent-2.0.0.tgz** (Vulnerable Library) </details> <details><summary><b>glob-parent-5.1.2.tgz</b></p></summary> <p>Extract the non-magic parent path from a glob string.</p> <p>Library home page: <a href="https://registry.npmjs.org/glob-parent/-/glob-parent-5.1.2.tgz">https://registry.npmjs.org/glob-parent/-/glob-parent-5.1.2.tgz</a></p> <p> Dependency Hierarchy: - eslint-7.26.0.tgz (Root Library) - :x: **glob-parent-5.1.2.tgz** (Vulnerable Library) </details> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The package glob-parent before 6.0.1 are vulnerable to Regular Expression Denial of Service (ReDoS) <p>Publish Date: 2021-06-22 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-35065>CVE-2021-35065</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/gulpjs/glob-parent/pull/49">https://github.com/gulpjs/glob-parent/pull/49</a></p> <p>Release Date: 2021-06-22</p> <p>Fix Resolution: glob-parent - 6.0.1</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"glob-parent","packageVersion":"2.0.0","packageFilePaths":["/ctrlSrv/processor/package.json"],"isTransitiveDependency":true,"dependencyTree":"babel-cli:6.26.0;chokidar:1.7.0;glob-parent:2.0.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"glob-parent - 6.0.1","isBinary":false},{"packageType":"javascript/Node.js","packageName":"glob-parent","packageVersion":"5.1.2","packageFilePaths":[null],"isTransitiveDependency":true,"dependencyTree":"eslint:7.26.0;glob-parent:5.1.2","isMinimumFixVersionAvailable":true,"minimumFixVersion":"glob-parent - 6.0.1","isBinary":false}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2021-35065","vulnerabilityDetails":"The package glob-parent before 6.0.1 are vulnerable to Regular Expression Denial of Service (ReDoS) ","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-35065","cvss3Severity":"medium","cvss3Score":"5.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Changed","C":"Low","UI":"Required","AV":"Network","I":"Low"},"extraData":{}}</REMEDIATE> -->
True
CVE-2021-35065 (Medium) detected in glob-parent-2.0.0.tgz, glob-parent-5.1.2.tgz - autoclosed - ## CVE-2021-35065 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>glob-parent-2.0.0.tgz</b>, <b>glob-parent-5.1.2.tgz</b></p></summary> <p> <details><summary><b>glob-parent-2.0.0.tgz</b></p></summary> <p>Strips glob magic from a string to provide the parent path</p> <p>Library home page: <a href="https://registry.npmjs.org/glob-parent/-/glob-parent-2.0.0.tgz">https://registry.npmjs.org/glob-parent/-/glob-parent-2.0.0.tgz</a></p> <p>Path to dependency file: /ctrlSrv/processor/package.json</p> <p>Path to vulnerable library: /ctrlSrv/processor/node_modules/glob-parent/package.json</p> <p> Dependency Hierarchy: - babel-cli-6.26.0.tgz (Root Library) - chokidar-1.7.0.tgz - :x: **glob-parent-2.0.0.tgz** (Vulnerable Library) </details> <details><summary><b>glob-parent-5.1.2.tgz</b></p></summary> <p>Extract the non-magic parent path from a glob string.</p> <p>Library home page: <a href="https://registry.npmjs.org/glob-parent/-/glob-parent-5.1.2.tgz">https://registry.npmjs.org/glob-parent/-/glob-parent-5.1.2.tgz</a></p> <p> Dependency Hierarchy: - eslint-7.26.0.tgz (Root Library) - :x: **glob-parent-5.1.2.tgz** (Vulnerable Library) </details> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The package glob-parent before 6.0.1 are vulnerable to Regular Expression Denial of Service (ReDoS) <p>Publish Date: 2021-06-22 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-35065>CVE-2021-35065</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/gulpjs/glob-parent/pull/49">https://github.com/gulpjs/glob-parent/pull/49</a></p> <p>Release Date: 2021-06-22</p> <p>Fix Resolution: glob-parent - 6.0.1</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"glob-parent","packageVersion":"2.0.0","packageFilePaths":["/ctrlSrv/processor/package.json"],"isTransitiveDependency":true,"dependencyTree":"babel-cli:6.26.0;chokidar:1.7.0;glob-parent:2.0.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"glob-parent - 6.0.1","isBinary":false},{"packageType":"javascript/Node.js","packageName":"glob-parent","packageVersion":"5.1.2","packageFilePaths":[null],"isTransitiveDependency":true,"dependencyTree":"eslint:7.26.0;glob-parent:5.1.2","isMinimumFixVersionAvailable":true,"minimumFixVersion":"glob-parent - 6.0.1","isBinary":false}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2021-35065","vulnerabilityDetails":"The package glob-parent before 6.0.1 are vulnerable to Regular Expression Denial of Service (ReDoS) ","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-35065","cvss3Severity":"medium","cvss3Score":"5.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Changed","C":"Low","UI":"Required","AV":"Network","I":"Low"},"extraData":{}}</REMEDIATE> -->
non_priority
cve medium detected in glob parent tgz glob parent tgz autoclosed cve medium severity vulnerability vulnerable libraries glob parent tgz glob parent tgz glob parent tgz strips glob magic from a string to provide the parent path library home page a href path to dependency file ctrlsrv processor package json path to vulnerable library ctrlsrv processor node modules glob parent package json dependency hierarchy babel cli tgz root library chokidar tgz x glob parent tgz vulnerable library glob parent tgz extract the non magic parent path from a glob string library home page a href dependency hierarchy eslint tgz root library x glob parent tgz vulnerable library found in base branch main vulnerability details the package glob parent before are vulnerable to regular expression denial of service redos publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution glob parent isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree babel cli chokidar glob parent isminimumfixversionavailable true minimumfixversion glob parent isbinary false packagetype javascript node js packagename glob parent packageversion packagefilepaths istransitivedependency true dependencytree eslint glob parent isminimumfixversionavailable true minimumfixversion glob parent isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails the package glob parent before are vulnerable to regular expression denial of service redos vulnerabilityurl
0
287,641
21,663,998,077
IssuesEvent
2022-05-07 00:02:58
miversen33/netman.nvim
https://api.github.com/repos/miversen33/netman.nvim
closed
Netman Options (`netman.options`) Needs documentation
documentation Core
Title is self explanatory. Netman Options are used everywhere and have effectively no documentation. We should absolutely have a vim doc for this, and probably also worth throwing something in the `wiki` for it.
1.0
Netman Options (`netman.options`) Needs documentation - Title is self explanatory. Netman Options are used everywhere and have effectively no documentation. We should absolutely have a vim doc for this, and probably also worth throwing something in the `wiki` for it.
non_priority
netman options netman options needs documentation title is self explanatory netman options are used everywhere and have effectively no documentation we should absolutely have a vim doc for this and probably also worth throwing something in the wiki for it
0
95,532
16,096,805,712
IssuesEvent
2021-04-27 01:51:40
emilwareus/spring-boot
https://api.github.com/repos/emilwareus/spring-boot
opened
CVE-2021-28168 (Medium) detected in jersey-common-2.28.jar
security vulnerability
## CVE-2021-28168 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jersey-common-2.28.jar</b></p></summary> <p>Jersey core common packages</p> <p>Library home page: <a href="https://projects.eclipse.org/projects/ee4j.jersey">https://projects.eclipse.org/projects/ee4j.jersey</a></p> <p>Path to dependency file: /spring-boot/spring-boot-project/spring-boot-autoconfigure/pom.xml</p> <p>Path to vulnerable library: /root/.m2/repository/org/glassfish/jersey/core/jersey-common/2.28/jersey-common-2.28.jar,/root/.m2/repository/org/glassfish/jersey/core/jersey-common/2.28/jersey-common-2.28.jar,/root/.m2/repository/org/glassfish/jersey/core/jersey-common/2.28/jersey-common-2.28.jar,/root/.m2/repository/org/glassfish/jersey/core/jersey-common/2.28/jersey-common-2.28.jar,/root/.m2/repository/org/glassfish/jersey/core/jersey-common/2.28/jersey-common-2.28.jar</p> <p> Dependency Hierarchy: - jersey-container-servlet-core-2.28.jar (Root Library) - :x: **jersey-common-2.28.jar** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Eclipse Jersey 2.28 to 2.33 and Eclipse Jersey 3.0.0 to 3.0.1 contains a local information disclosure vulnerability. This is due to the use of the File.createTempFile which creates a file inside of the system temporary directory with the permissions: -rw-r--r--. Thus the contents of this file are viewable by all other users locally on the system. As such, if the contents written is security sensitive, it can be disclosed to other local users. <p>Publish Date: 2021-04-22 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-28168>CVE-2021-28168</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.2</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/eclipse-ee4j/jersey/security/advisories/GHSA-c43q-5hpj-4crv">https://github.com/eclipse-ee4j/jersey/security/advisories/GHSA-c43q-5hpj-4crv</a></p> <p>Release Date: 2021-04-22</p> <p>Fix Resolution: org.glassfish.jersey.core:jersey-common:2.34,3.0.2</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-28168 (Medium) detected in jersey-common-2.28.jar - ## CVE-2021-28168 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jersey-common-2.28.jar</b></p></summary> <p>Jersey core common packages</p> <p>Library home page: <a href="https://projects.eclipse.org/projects/ee4j.jersey">https://projects.eclipse.org/projects/ee4j.jersey</a></p> <p>Path to dependency file: /spring-boot/spring-boot-project/spring-boot-autoconfigure/pom.xml</p> <p>Path to vulnerable library: /root/.m2/repository/org/glassfish/jersey/core/jersey-common/2.28/jersey-common-2.28.jar,/root/.m2/repository/org/glassfish/jersey/core/jersey-common/2.28/jersey-common-2.28.jar,/root/.m2/repository/org/glassfish/jersey/core/jersey-common/2.28/jersey-common-2.28.jar,/root/.m2/repository/org/glassfish/jersey/core/jersey-common/2.28/jersey-common-2.28.jar,/root/.m2/repository/org/glassfish/jersey/core/jersey-common/2.28/jersey-common-2.28.jar</p> <p> Dependency Hierarchy: - jersey-container-servlet-core-2.28.jar (Root Library) - :x: **jersey-common-2.28.jar** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Eclipse Jersey 2.28 to 2.33 and Eclipse Jersey 3.0.0 to 3.0.1 contains a local information disclosure vulnerability. This is due to the use of the File.createTempFile which creates a file inside of the system temporary directory with the permissions: -rw-r--r--. Thus the contents of this file are viewable by all other users locally on the system. As such, if the contents written is security sensitive, it can be disclosed to other local users. <p>Publish Date: 2021-04-22 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-28168>CVE-2021-28168</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.2</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/eclipse-ee4j/jersey/security/advisories/GHSA-c43q-5hpj-4crv">https://github.com/eclipse-ee4j/jersey/security/advisories/GHSA-c43q-5hpj-4crv</a></p> <p>Release Date: 2021-04-22</p> <p>Fix Resolution: org.glassfish.jersey.core:jersey-common:2.34,3.0.2</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in jersey common jar cve medium severity vulnerability vulnerable library jersey common jar jersey core common packages library home page a href path to dependency file spring boot spring boot project spring boot autoconfigure pom xml path to vulnerable library root repository org glassfish jersey core jersey common jersey common jar root repository org glassfish jersey core jersey common jersey common jar root repository org glassfish jersey core jersey common jersey common jar root repository org glassfish jersey core jersey common jersey common jar root repository org glassfish jersey core jersey common jersey common jar dependency hierarchy jersey container servlet core jar root library x jersey common jar vulnerable library vulnerability details eclipse jersey to and eclipse jersey to contains a local information disclosure vulnerability this is due to the use of the file createtempfile which creates a file inside of the system temporary directory with the permissions rw r r thus the contents of this file are viewable by all other users locally on the system as such if the contents written is security sensitive it can be disclosed to other local users publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org glassfish jersey core jersey common step up your open source security game with whitesource
0
281,703
24,413,370,035
IssuesEvent
2022-10-05 14:07:07
apache/beam
https://api.github.com/repos/apache/beam
closed
Dataflow streaming tests failing new AfterSynchronizedProcessingTime test
runners dataflow P1 bug test-failures flake
The new test `org.apache.beam.sdk.transforms.GroupByKeyTest$BasicTests.testAfterProcessingTimeContinuationTriggerUsingState` is failing on Dataflow streaming. Most likely the delays are not large enough for Dataflow's bundle latency, so the triggering does not occur early. https://ci-beam.apache.org/job/beam_PostCommit_Java_ValidatesRunner_Dataflow_Streaming/1876/testReport/junit/org.apache.beam.sdk.transforms/GroupByKeyTest$BasicTests/testAfterProcessingTimeContinuationTriggerUsingState/ Imported from Jira [BEAM-13952](https://issues.apache.org/jira/browse/BEAM-13952). Original Jira may contain additional context. Reported by: kenn.
1.0
Dataflow streaming tests failing new AfterSynchronizedProcessingTime test - The new test `org.apache.beam.sdk.transforms.GroupByKeyTest$BasicTests.testAfterProcessingTimeContinuationTriggerUsingState` is failing on Dataflow streaming. Most likely the delays are not large enough for Dataflow's bundle latency, so the triggering does not occur early. https://ci-beam.apache.org/job/beam_PostCommit_Java_ValidatesRunner_Dataflow_Streaming/1876/testReport/junit/org.apache.beam.sdk.transforms/GroupByKeyTest$BasicTests/testAfterProcessingTimeContinuationTriggerUsingState/ Imported from Jira [BEAM-13952](https://issues.apache.org/jira/browse/BEAM-13952). Original Jira may contain additional context. Reported by: kenn.
non_priority
dataflow streaming tests failing new aftersynchronizedprocessingtime test the new test org apache beam sdk transforms groupbykeytest basictests testafterprocessingtimecontinuationtriggerusingstate is failing on dataflow streaming most likely the delays are not large enough for dataflow s bundle latency so the triggering does not occur early imported from jira original jira may contain additional context reported by kenn
0
39,259
5,064,659,089
IssuesEvent
2016-12-23 08:00:18
tor4kichi/Hohoema
https://api.github.com/repos/tor4kichi/Hohoema
opened
メニューを含めたベースレイアウトを修正
ui_design
以下の画面タイプごとにレイアウトが適用されるように変更します。 * 中~大画面向け * モバイル向け * XInput向け PCで操作中の場合にXInputレイアウトを使用しないオプションを利用可能にします。
1.0
メニューを含めたベースレイアウトを修正 - 以下の画面タイプごとにレイアウトが適用されるように変更します。 * 中~大画面向け * モバイル向け * XInput向け PCで操作中の場合にXInputレイアウトを使用しないオプションを利用可能にします。
non_priority
メニューを含めたベースレイアウトを修正 以下の画面タイプごとにレイアウトが適用されるように変更します。 中~大画面向け モバイル向け xinput向け pcで操作中の場合にxinputレイアウトを使用しないオプションを利用可能にします。
0
31,814
6,001,046,088
IssuesEvent
2017-06-05 07:52:04
brave/browser-laptop
https://api.github.com/repos/brave/browser-laptop
closed
Snap Package for Brave
documentation ✍ installation OS/linux-distros QA/no-qa-needed release-notes/exclude suggestion
- Did you search for similar issues before submitting this one? **Yes** - Describe the issue you encountered: **Installing on Ubuntu, derivatives, and Linux in general could be much easier.** - Platform (Win7, 8, 10? macOS? Linux distro?): **Ubuntu and Elementary (Linux)** ### What are Snaps? Snap packaging was developed in order to make installation of software easier on Linux, and to make targeting the platform as a whole simpler for developers. Ubuntu is currently accepting Snap packages into its app store through their [developer portal](https://myapps.developer.ubuntu.com/dev/click-apps/). This would serve as an easier way for getting Brave on Ubuntu, and if snapd is installed on other distributions the installation is very straightforward as well. *Snaps* is a nickname for a snap package. ### How much work is it? Electron Builder now supports the generation of a snap package. This should make it much simpler to implement into the current process fairly easily. The options are detailed on the [Electron Builder wiki](https://github.com/electron-userland/electron-builder/wiki/Options#SnapOptions). The Ubuntu community has been amazing about helping projects get their software packaged as snaps. If this is a target the Brave community is interested in hitting, then we can tap the Ubuntu folks for help and I'm sure they will gladly lend their aide.
1.0
Snap Package for Brave - - Did you search for similar issues before submitting this one? **Yes** - Describe the issue you encountered: **Installing on Ubuntu, derivatives, and Linux in general could be much easier.** - Platform (Win7, 8, 10? macOS? Linux distro?): **Ubuntu and Elementary (Linux)** ### What are Snaps? Snap packaging was developed in order to make installation of software easier on Linux, and to make targeting the platform as a whole simpler for developers. Ubuntu is currently accepting Snap packages into its app store through their [developer portal](https://myapps.developer.ubuntu.com/dev/click-apps/). This would serve as an easier way for getting Brave on Ubuntu, and if snapd is installed on other distributions the installation is very straightforward as well. *Snaps* is a nickname for a snap package. ### How much work is it? Electron Builder now supports the generation of a snap package. This should make it much simpler to implement into the current process fairly easily. The options are detailed on the [Electron Builder wiki](https://github.com/electron-userland/electron-builder/wiki/Options#SnapOptions). The Ubuntu community has been amazing about helping projects get their software packaged as snaps. If this is a target the Brave community is interested in hitting, then we can tap the Ubuntu folks for help and I'm sure they will gladly lend their aide.
non_priority
snap package for brave did you search for similar issues before submitting this one yes describe the issue you encountered installing on ubuntu derivatives and linux in general could be much easier platform macos linux distro ubuntu and elementary linux what are snaps snap packaging was developed in order to make installation of software easier on linux and to make targeting the platform as a whole simpler for developers ubuntu is currently accepting snap packages into its app store through their this would serve as an easier way for getting brave on ubuntu and if snapd is installed on other distributions the installation is very straightforward as well snaps is a nickname for a snap package how much work is it electron builder now supports the generation of a snap package this should make it much simpler to implement into the current process fairly easily the options are detailed on the the ubuntu community has been amazing about helping projects get their software packaged as snaps if this is a target the brave community is interested in hitting then we can tap the ubuntu folks for help and i m sure they will gladly lend their aide
0
4,881
3,897,418,196
IssuesEvent
2016-04-16 12:01:58
lionheart/openradar-mirror
https://api.github.com/repos/lionheart/openradar-mirror
opened
15632010: Cycling between spaces for an application by clicking the dock icon does not update keyboard focus
classification:ui/usability reproducible:always status:open
#### Description Summary: On 10.9 (I don't have a 10.8 machine handy to test against), clicking the dock icon for an application with windows on multiple spaces does not update keyboard focus cycling between spaces. Steps to Reproduce: 1. Open two TextEdit windows. (I've also reproduced this with Preview, Safari, and Terminal.) 2. Place each window on a separate space. 3. Focus the content area (for other applications, some widget that takes keyboard input like the address bar in Safari) in each window. 4. Activate one of the windows. Keep the content area focused. 5. Click the TextEdit dock icon to switch to the workspace containing the other window. 6. Hit some keys. Expected Results: The keystrokes get sent to the newly active window (or perhaps no window at all). Actual Results: The keystrokes appear in the old window on the previous space. Depending on the application, this may be invisible or it may switch you back to the space containing the old window. Version: 10.9 Notes: Configuration: Attachments: - Product Version: 10.9 Created: 2013-12-11T00:11:58.040929 Originated: 2013-12-10T00:00:00 Open Radar Link: http://www.openradar.me/15632010
True
15632010: Cycling between spaces for an application by clicking the dock icon does not update keyboard focus - #### Description Summary: On 10.9 (I don't have a 10.8 machine handy to test against), clicking the dock icon for an application with windows on multiple spaces does not update keyboard focus cycling between spaces. Steps to Reproduce: 1. Open two TextEdit windows. (I've also reproduced this with Preview, Safari, and Terminal.) 2. Place each window on a separate space. 3. Focus the content area (for other applications, some widget that takes keyboard input like the address bar in Safari) in each window. 4. Activate one of the windows. Keep the content area focused. 5. Click the TextEdit dock icon to switch to the workspace containing the other window. 6. Hit some keys. Expected Results: The keystrokes get sent to the newly active window (or perhaps no window at all). Actual Results: The keystrokes appear in the old window on the previous space. Depending on the application, this may be invisible or it may switch you back to the space containing the old window. Version: 10.9 Notes: Configuration: Attachments: - Product Version: 10.9 Created: 2013-12-11T00:11:58.040929 Originated: 2013-12-10T00:00:00 Open Radar Link: http://www.openradar.me/15632010
non_priority
cycling between spaces for an application by clicking the dock icon does not update keyboard focus description summary on i don t have a machine handy to test against clicking the dock icon for an application with windows on multiple spaces does not update keyboard focus cycling between spaces steps to reproduce open two textedit windows i ve also reproduced this with preview safari and terminal place each window on a separate space focus the content area for other applications some widget that takes keyboard input like the address bar in safari in each window activate one of the windows keep the content area focused click the textedit dock icon to switch to the workspace containing the other window hit some keys expected results the keystrokes get sent to the newly active window or perhaps no window at all actual results the keystrokes appear in the old window on the previous space depending on the application this may be invisible or it may switch you back to the space containing the old window version notes configuration attachments product version created originated open radar link
0
128,108
17,410,631,314
IssuesEvent
2021-08-03 11:52:42
Joystream/atlas
https://api.github.com/repos/Joystream/atlas
closed
Atlas Player: Design Ideas Backlog
design enhancement idea player ⚙ component:player
# Document Purpose This document aims to gather all ideas for improvements and new functionalities around Atlas' video player. Design-wise, ideally, all the things below are tackled during one go. Implementation-wise, the below items can be taken apart from the list and implemented at different points in time, as I see no mutual dependence in the below functionalities atm. It does not apply to functionalities marked as critical. Regarding the order of implementation, following the order in which ideas are presented below would be preferable. ## Changes/adjustments: ### #821 Player's UI revamp/overhaul (🚨 Critical) - To make the currently available controls visually aligned with the JS design system (through the use of components from the JS component library or through introducing new components, based on previously established style guide). - To ensure a working mobile experience for each functionality mentioned below. ### #821 Adjustments to the logic behind showing/hiding player's UI - To hide the player's UI immediately after the cursor leaves the player area. - To hide the player's UI after **3 seconds** (? to be confirmed through research and testing) after the playing has been resumed. ### #822 Adjust states of the player - To introduce an error state for (#40): - Failed to load the whole video page, - Failed to load the media file, - To introduce states for video completion (#52): - When the standalone video finished playing, - When the playlist video finished playing. ## New functionalities: ### #823 Introduce keyboard shortcuts Key(s) | Action | Visual Feedback ------------ | ------------- | ------------- `Spacebar` , `k` | Play/pause | Yes `←` and `→` | Seek backward/forwards by 5 seconds | Yes `J` and `L` | Seek backward/forwards by 10 second `↑` and `↓` | Increase/decrease volume by 10% | Yes `M` | Toggle mute | Yes `F` and `Escape` | Toggle full-screen mode ### #824 Video preview when scrubbing To allow the user to preview the video at the selected point on the timeline. ### #825 Quality controls To allow the user to change the quality of the playback (eg. 360p, 480p, 720p, 1080p, etc.), providing an “Auto” option at the same time. ### #825 Playback speed controls To allow the user to change the speed of the playback (eg. 0.25, 0.5, 0.75, 1, 1.25, 1.5, 1.75, 2). ### #825 CC/Subtitles To allow the user to enable/disable CC or subtitles included with the video during upload. ### #826 Casting To allow the user to cast the video to a TV. ### #827 Prev/next controls To allow the user to jump into previous (in case of playlists) and/or next (in case of playlists, otherwise: suggested) videos. ### #828 In-player social features To allow the user to share a video from the player: - Copy/generate a link, - Include a timestamp, - Share on social media platforms (the list of platforms to be finalized through a research), ## Other ### Adjust the video page - To introduce suggested videos section (as opposed to only having other videos from the same author), - To introduce a default player mode (size, as opposed to the current “cinema-mode”), - To introduce a platform-wide PIP mode (to allow the user to navigate into different screens/pages in the app, while watching the video),
1.0
Atlas Player: Design Ideas Backlog - # Document Purpose This document aims to gather all ideas for improvements and new functionalities around Atlas' video player. Design-wise, ideally, all the things below are tackled during one go. Implementation-wise, the below items can be taken apart from the list and implemented at different points in time, as I see no mutual dependence in the below functionalities atm. It does not apply to functionalities marked as critical. Regarding the order of implementation, following the order in which ideas are presented below would be preferable. ## Changes/adjustments: ### #821 Player's UI revamp/overhaul (🚨 Critical) - To make the currently available controls visually aligned with the JS design system (through the use of components from the JS component library or through introducing new components, based on previously established style guide). - To ensure a working mobile experience for each functionality mentioned below. ### #821 Adjustments to the logic behind showing/hiding player's UI - To hide the player's UI immediately after the cursor leaves the player area. - To hide the player's UI after **3 seconds** (? to be confirmed through research and testing) after the playing has been resumed. ### #822 Adjust states of the player - To introduce an error state for (#40): - Failed to load the whole video page, - Failed to load the media file, - To introduce states for video completion (#52): - When the standalone video finished playing, - When the playlist video finished playing. ## New functionalities: ### #823 Introduce keyboard shortcuts Key(s) | Action | Visual Feedback ------------ | ------------- | ------------- `Spacebar` , `k` | Play/pause | Yes `←` and `→` | Seek backward/forwards by 5 seconds | Yes `J` and `L` | Seek backward/forwards by 10 second `↑` and `↓` | Increase/decrease volume by 10% | Yes `M` | Toggle mute | Yes `F` and `Escape` | Toggle full-screen mode ### #824 Video preview when scrubbing To allow the user to preview the video at the selected point on the timeline. ### #825 Quality controls To allow the user to change the quality of the playback (eg. 360p, 480p, 720p, 1080p, etc.), providing an “Auto” option at the same time. ### #825 Playback speed controls To allow the user to change the speed of the playback (eg. 0.25, 0.5, 0.75, 1, 1.25, 1.5, 1.75, 2). ### #825 CC/Subtitles To allow the user to enable/disable CC or subtitles included with the video during upload. ### #826 Casting To allow the user to cast the video to a TV. ### #827 Prev/next controls To allow the user to jump into previous (in case of playlists) and/or next (in case of playlists, otherwise: suggested) videos. ### #828 In-player social features To allow the user to share a video from the player: - Copy/generate a link, - Include a timestamp, - Share on social media platforms (the list of platforms to be finalized through a research), ## Other ### Adjust the video page - To introduce suggested videos section (as opposed to only having other videos from the same author), - To introduce a default player mode (size, as opposed to the current “cinema-mode”), - To introduce a platform-wide PIP mode (to allow the user to navigate into different screens/pages in the app, while watching the video),
non_priority
atlas player design ideas backlog document purpose this document aims to gather all ideas for improvements and new functionalities around atlas video player design wise ideally all the things below are tackled during one go implementation wise the below items can be taken apart from the list and implemented at different points in time as i see no mutual dependence in the below functionalities atm it does not apply to functionalities marked as critical regarding the order of implementation following the order in which ideas are presented below would be preferable changes adjustments player s ui revamp overhaul 🚨 critical to make the currently available controls visually aligned with the js design system through the use of components from the js component library or through introducing new components based on previously established style guide to ensure a working mobile experience for each functionality mentioned below adjustments to the logic behind showing hiding player s ui to hide the player s ui immediately after the cursor leaves the player area to hide the player s ui after seconds to be confirmed through research and testing after the playing has been resumed adjust states of the player to introduce an error state for failed to load the whole video page failed to load the media file to introduce states for video completion when the standalone video finished playing when the playlist video finished playing new functionalities introduce keyboard shortcuts key s action visual feedback spacebar k play pause yes ← and → seek backward forwards by seconds yes j and l seek backward forwards by second ↑ and ↓ increase decrease volume by yes m toggle mute yes f and escape toggle full screen mode video preview when scrubbing to allow the user to preview the video at the selected point on the timeline quality controls to allow the user to change the quality of the playback eg etc providing an “auto” option at the same time playback speed controls to allow the user to change the speed of the playback eg cc subtitles to allow the user to enable disable cc or subtitles included with the video during upload casting to allow the user to cast the video to a tv prev next controls to allow the user to jump into previous in case of playlists and or next in case of playlists otherwise suggested videos in player social features to allow the user to share a video from the player copy generate a link include a timestamp share on social media platforms the list of platforms to be finalized through a research other adjust the video page to introduce suggested videos section as opposed to only having other videos from the same author to introduce a default player mode size as opposed to the current “cinema mode” to introduce a platform wide pip mode to allow the user to navigate into different screens pages in the app while watching the video
0
138,802
18,795,945,487
IssuesEvent
2021-11-08 22:20:41
Dima2022/blueflood
https://api.github.com/repos/Dima2022/blueflood
opened
CVE-2020-36184 (High) detected in jackson-databind-2.3.1.jar, jackson-databind-2.9.2.jar
security vulnerability
## CVE-2020-36184 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>jackson-databind-2.3.1.jar</b>, <b>jackson-databind-2.9.2.jar</b></p></summary> <p> <details><summary><b>jackson-databind-2.3.1.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Path to dependency file: blueflood/contrib/logstash-support/pom.xml</p> <p>Path to vulnerable library: 0302_PLDTMW/downloadResource_SLAJUO/20211108221834/jackson-databind-2.3.1.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.3.1.jar** (Vulnerable Library) </details> <details><summary><b>jackson-databind-2.9.2.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: blueflood/blueflood-elasticsearch/pom.xml</p> <p>Path to vulnerable library: /repository/com/fasterxml/jackson/core/jackson-databind/2.9.2/jackson-databind-2.9.2.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.9.2.jar** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/Dima2022/blueflood/commit/d7a020f20084b3c541eb9593532d06fd240bb549">d7a020f20084b3c541eb9593532d06fd240bb549</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource. <p>Publish Date: 2021-01-06 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36184>CVE-2020-36184</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/FasterXML/jackson-databind/issues/2998">https://github.com/FasterXML/jackson-databind/issues/2998</a></p> <p>Release Date: 2021-01-06</p> <p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.9.10.8</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.3.1","packageFilePaths":["/contrib/logstash-support/pom.xml"],"isTransitiveDependency":false,"dependencyTree":"com.fasterxml.jackson.core:jackson-databind:2.3.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.fasterxml.jackson.core:jackson-databind:2.9.10.8"},{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.9.2","packageFilePaths":["/blueflood-elasticsearch/pom.xml"],"isTransitiveDependency":false,"dependencyTree":"com.fasterxml.jackson.core:jackson-databind:2.9.2","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.fasterxml.jackson.core:jackson-databind:2.9.10.8"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-36184","vulnerabilityDetails":"FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36184","cvss3Severity":"high","cvss3Score":"8.1","cvss3Metrics":{"A":"High","AC":"High","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
True
CVE-2020-36184 (High) detected in jackson-databind-2.3.1.jar, jackson-databind-2.9.2.jar - ## CVE-2020-36184 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>jackson-databind-2.3.1.jar</b>, <b>jackson-databind-2.9.2.jar</b></p></summary> <p> <details><summary><b>jackson-databind-2.3.1.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Path to dependency file: blueflood/contrib/logstash-support/pom.xml</p> <p>Path to vulnerable library: 0302_PLDTMW/downloadResource_SLAJUO/20211108221834/jackson-databind-2.3.1.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.3.1.jar** (Vulnerable Library) </details> <details><summary><b>jackson-databind-2.9.2.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: blueflood/blueflood-elasticsearch/pom.xml</p> <p>Path to vulnerable library: /repository/com/fasterxml/jackson/core/jackson-databind/2.9.2/jackson-databind-2.9.2.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.9.2.jar** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/Dima2022/blueflood/commit/d7a020f20084b3c541eb9593532d06fd240bb549">d7a020f20084b3c541eb9593532d06fd240bb549</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource. <p>Publish Date: 2021-01-06 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36184>CVE-2020-36184</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/FasterXML/jackson-databind/issues/2998">https://github.com/FasterXML/jackson-databind/issues/2998</a></p> <p>Release Date: 2021-01-06</p> <p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.9.10.8</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.3.1","packageFilePaths":["/contrib/logstash-support/pom.xml"],"isTransitiveDependency":false,"dependencyTree":"com.fasterxml.jackson.core:jackson-databind:2.3.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.fasterxml.jackson.core:jackson-databind:2.9.10.8"},{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.9.2","packageFilePaths":["/blueflood-elasticsearch/pom.xml"],"isTransitiveDependency":false,"dependencyTree":"com.fasterxml.jackson.core:jackson-databind:2.9.2","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.fasterxml.jackson.core:jackson-databind:2.9.10.8"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-36184","vulnerabilityDetails":"FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36184","cvss3Severity":"high","cvss3Score":"8.1","cvss3Metrics":{"A":"High","AC":"High","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
non_priority
cve high detected in jackson databind jar jackson databind jar cve high severity vulnerability vulnerable libraries jackson databind jar jackson databind jar jackson databind jar general data binding functionality for jackson works on core streaming api path to dependency file blueflood contrib logstash support pom xml path to vulnerable library pldtmw downloadresource slajuo jackson databind jar dependency hierarchy x jackson databind jar vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file blueflood blueflood elasticsearch pom xml path to vulnerable library repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to org apache tomcat dbcp datasources peruserpooldatasource publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency false dependencytree com fasterxml jackson core jackson databind isminimumfixversionavailable true minimumfixversion com fasterxml jackson core jackson databind packagetype java groupid com fasterxml jackson core packagename jackson databind packageversion packagefilepaths istransitivedependency false dependencytree com fasterxml jackson core jackson databind isminimumfixversionavailable true minimumfixversion com fasterxml jackson core jackson databind basebranches vulnerabilityidentifier cve vulnerabilitydetails fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to org apache tomcat dbcp datasources peruserpooldatasource vulnerabilityurl
0
7,171
16,902,649,427
IssuesEvent
2021-06-24 00:25:32
privacy-tech-lab/optmeowt-browser-extension
https://api.github.com/repos/privacy-tech-lab/optmeowt-browser-extension
closed
New dev environment using Webpack to build Firefox & Chrome versions
architecture core functionality
This is the last big sensitive refactoring issue. Ideally, we will have one repo for both the Chrome and Firefox versions we will be developing. However, since the Firefox version will be diverging from Chrome in the near future, as well as for the sake of codebase simplicity, we need to find a way to abstract away the browser specifics from the code base and use some sort of javascript compiler and task runner to build the version of the extension we want during development. One way to implement this is to have two separate `events.js` and `background.js` files, i.e., `firefox-events.js` / `chrome-events.js`, etc., and then have a task runner chose which files to build when we test/distribute. The other way I am thinking is to have a more "combined" repository, and use a task runner to fill in the browser we choose, i.e., have all the functions necessary for each browser together and then use $BROWSER or some other keyword in place of the browser name which the task runner will fill in. I'm leaning towards the first option, though we will still need to make sure we update both Chrome and Firefox versions for new functionality that should be included in both. I will take a look at this once issue #178 is all set since we could use this implementation, ideally with a task runner and Babel/Webpack, in order to use better node libraries in place of what we use, as well as simplify our code base.
1.0
New dev environment using Webpack to build Firefox & Chrome versions - This is the last big sensitive refactoring issue. Ideally, we will have one repo for both the Chrome and Firefox versions we will be developing. However, since the Firefox version will be diverging from Chrome in the near future, as well as for the sake of codebase simplicity, we need to find a way to abstract away the browser specifics from the code base and use some sort of javascript compiler and task runner to build the version of the extension we want during development. One way to implement this is to have two separate `events.js` and `background.js` files, i.e., `firefox-events.js` / `chrome-events.js`, etc., and then have a task runner chose which files to build when we test/distribute. The other way I am thinking is to have a more "combined" repository, and use a task runner to fill in the browser we choose, i.e., have all the functions necessary for each browser together and then use $BROWSER or some other keyword in place of the browser name which the task runner will fill in. I'm leaning towards the first option, though we will still need to make sure we update both Chrome and Firefox versions for new functionality that should be included in both. I will take a look at this once issue #178 is all set since we could use this implementation, ideally with a task runner and Babel/Webpack, in order to use better node libraries in place of what we use, as well as simplify our code base.
non_priority
new dev environment using webpack to build firefox chrome versions this is the last big sensitive refactoring issue ideally we will have one repo for both the chrome and firefox versions we will be developing however since the firefox version will be diverging from chrome in the near future as well as for the sake of codebase simplicity we need to find a way to abstract away the browser specifics from the code base and use some sort of javascript compiler and task runner to build the version of the extension we want during development one way to implement this is to have two separate events js and background js files i e firefox events js chrome events js etc and then have a task runner chose which files to build when we test distribute the other way i am thinking is to have a more combined repository and use a task runner to fill in the browser we choose i e have all the functions necessary for each browser together and then use browser or some other keyword in place of the browser name which the task runner will fill in i m leaning towards the first option though we will still need to make sure we update both chrome and firefox versions for new functionality that should be included in both i will take a look at this once issue is all set since we could use this implementation ideally with a task runner and babel webpack in order to use better node libraries in place of what we use as well as simplify our code base
0
22,094
18,668,954,968
IssuesEvent
2021-10-30 10:28:46
AntennaPod/AntennaPod
https://api.github.com/repos/AntennaPod/AntennaPod
closed
'Keep sorted' and 'Lock queue' interfere: hide latter when former is active
Type: Enhancement Area: Usability
# Checklist <!-- Place an x in the boxes to tick them: [x] --> - [x ] I have used the search function to see if someone else has already submitted the same feature request. - [x ] I will only create one feature request per issue. - [x ] I will describe the problem with as much detail as possible. # System info **App version**: 2.4.0-beta3 <!-- The latest version may be different depending on your device. You can find the version in AntennaPod's settings. --> **App source**: Google Play <!-- Please delete irrelevant answer or fill in the blank --> # Feature description **Problem you may be having, or feature you want**: When testing a debug build I got confused why don't have the drag handles in my main app, and why disabling 'lock queue' didn't make the drag handles appear. Until I realised that that was because I had 'keep sorted' active. My confusion stems from the fact that the two settings interact: when 'Keep sorted' is active, half the effect of 'Queue lock' is gone. Also swiping can be disabled and activated from 'Lock Queue' and from the swipe settings. One has to check two settings in order to understand why swiping is not possible. <!-- Give a brief explanation about the problem that may currently exist --> **Suggested solution**: * [ ] Hide 'Lock queue' when 'Keep sorted' is active. * [ ] Remove the effect of 'Lock queue' on the swipe settings. Some users might be confused about why they don't see 'lock queue' anymore, but that would be only a specific group for whom that setting is hardly useful anyway (those who have 'Keep sorted' enabled). For all users this will get rid of rather opaque interaction between different settings. <!-- Describe how your requested feature solves this problem. Try to be as specific as possible. Please not only explain what the feature does, but also how. --> **Screenshots / Drawings / Technical details**: <!-- If your request is about (or includes) changing or extending the UI, describe what the UI would look like and how the user would interact with it. -->
True
'Keep sorted' and 'Lock queue' interfere: hide latter when former is active - # Checklist <!-- Place an x in the boxes to tick them: [x] --> - [x ] I have used the search function to see if someone else has already submitted the same feature request. - [x ] I will only create one feature request per issue. - [x ] I will describe the problem with as much detail as possible. # System info **App version**: 2.4.0-beta3 <!-- The latest version may be different depending on your device. You can find the version in AntennaPod's settings. --> **App source**: Google Play <!-- Please delete irrelevant answer or fill in the blank --> # Feature description **Problem you may be having, or feature you want**: When testing a debug build I got confused why don't have the drag handles in my main app, and why disabling 'lock queue' didn't make the drag handles appear. Until I realised that that was because I had 'keep sorted' active. My confusion stems from the fact that the two settings interact: when 'Keep sorted' is active, half the effect of 'Queue lock' is gone. Also swiping can be disabled and activated from 'Lock Queue' and from the swipe settings. One has to check two settings in order to understand why swiping is not possible. <!-- Give a brief explanation about the problem that may currently exist --> **Suggested solution**: * [ ] Hide 'Lock queue' when 'Keep sorted' is active. * [ ] Remove the effect of 'Lock queue' on the swipe settings. Some users might be confused about why they don't see 'lock queue' anymore, but that would be only a specific group for whom that setting is hardly useful anyway (those who have 'Keep sorted' enabled). For all users this will get rid of rather opaque interaction between different settings. <!-- Describe how your requested feature solves this problem. Try to be as specific as possible. Please not only explain what the feature does, but also how. --> **Screenshots / Drawings / Technical details**: <!-- If your request is about (or includes) changing or extending the UI, describe what the UI would look like and how the user would interact with it. -->
non_priority
keep sorted and lock queue interfere hide latter when former is active checklist i have used the search function to see if someone else has already submitted the same feature request i will only create one feature request per issue i will describe the problem with as much detail as possible system info app version app source google play feature description problem you may be having or feature you want when testing a debug build i got confused why don t have the drag handles in my main app and why disabling lock queue didn t make the drag handles appear until i realised that that was because i had keep sorted active my confusion stems from the fact that the two settings interact when keep sorted is active half the effect of queue lock is gone also swiping can be disabled and activated from lock queue and from the swipe settings one has to check two settings in order to understand why swiping is not possible suggested solution hide lock queue when keep sorted is active remove the effect of lock queue on the swipe settings some users might be confused about why they don t see lock queue anymore but that would be only a specific group for whom that setting is hardly useful anyway those who have keep sorted enabled for all users this will get rid of rather opaque interaction between different settings screenshots drawings technical details
0
63,155
17,396,327,442
IssuesEvent
2021-08-02 13:53:54
vector-im/element-web
https://api.github.com/repos/vector-im/element-web
closed
silently stops receiving new messages
P-low P3 S-Critical T-Defect
Riot seems to sometimes spontaneously stop receiving new messages. :( Sending messages works, but they don't seem to come back down the sync. I've sent a couple of rageshakes. FF57.0b14 on Debian, using /develop
1.0
silently stops receiving new messages - Riot seems to sometimes spontaneously stop receiving new messages. :( Sending messages works, but they don't seem to come back down the sync. I've sent a couple of rageshakes. FF57.0b14 on Debian, using /develop
non_priority
silently stops receiving new messages riot seems to sometimes spontaneously stop receiving new messages sending messages works but they don t seem to come back down the sync i ve sent a couple of rageshakes on debian using develop
0
176,118
21,366,963,767
IssuesEvent
2022-04-20 03:28:58
jitrapon/glom-android
https://api.github.com/repos/jitrapon/glom-android
opened
CVE-2021-35515 (High) detected in commons-compress-1.12.jar
security vulnerability
## CVE-2021-35515 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>commons-compress-1.12.jar</b></p></summary> <p>Apache Commons Compress software defines an API for working with compression and archive formats. These include: bzip2, gzip, pack200, lzma, xz, Snappy, traditional Unix Compress, DEFLATE and ar, cpio, jar, tar, zip, dump, 7z, arj.</p> <p>Path to dependency file: /auth/build.gradle</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.commons/commons-compress/1.12/84caa68576e345eb5e7ae61a0e5a9229eb100d7b/commons-compress-1.12.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.commons/commons-compress/1.12/84caa68576e345eb5e7ae61a0e5a9229eb100d7b/commons-compress-1.12.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.commons/commons-compress/1.12/84caa68576e345eb5e7ae61a0e5a9229eb100d7b/commons-compress-1.12.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.commons/commons-compress/1.12/84caa68576e345eb5e7ae61a0e5a9229eb100d7b/commons-compress-1.12.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.commons/commons-compress/1.12/84caa68576e345eb5e7ae61a0e5a9229eb100d7b/commons-compress-1.12.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.commons/commons-compress/1.12/84caa68576e345eb5e7ae61a0e5a9229eb100d7b/commons-compress-1.12.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.commons/commons-compress/1.12/84caa68576e345eb5e7ae61a0e5a9229eb100d7b/commons-compress-1.12.jar</p> <p> Dependency Hierarchy: - lint-gradle-26.5.1.jar (Root Library) - builder-3.5.1.jar - sdklib-26.5.1.jar - :x: **commons-compress-1.12.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/jitrapon/glom-android/commit/fe568e5752e24693f6826e5ecd7694b4a426cb26">fe568e5752e24693f6826e5ecd7694b4a426cb26</a></p> <p>Found in base branch: <b>develop</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> When reading a specially crafted 7Z archive, the construction of the list of codecs that decompress an entry can result in an infinite loop. This could be used to mount a denial of service attack against services that use Compress' sevenz package. <p>Publish Date: 2021-07-13 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-35515>CVE-2021-35515</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://commons.apache.org/proper/commons-compress/security-reports.html">https://commons.apache.org/proper/commons-compress/security-reports.html</a></p> <p>Release Date: 2021-07-13</p> <p>Fix Resolution: org.apache.commons:commons-compress:1.21</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-35515 (High) detected in commons-compress-1.12.jar - ## CVE-2021-35515 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>commons-compress-1.12.jar</b></p></summary> <p>Apache Commons Compress software defines an API for working with compression and archive formats. These include: bzip2, gzip, pack200, lzma, xz, Snappy, traditional Unix Compress, DEFLATE and ar, cpio, jar, tar, zip, dump, 7z, arj.</p> <p>Path to dependency file: /auth/build.gradle</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.commons/commons-compress/1.12/84caa68576e345eb5e7ae61a0e5a9229eb100d7b/commons-compress-1.12.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.commons/commons-compress/1.12/84caa68576e345eb5e7ae61a0e5a9229eb100d7b/commons-compress-1.12.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.commons/commons-compress/1.12/84caa68576e345eb5e7ae61a0e5a9229eb100d7b/commons-compress-1.12.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.commons/commons-compress/1.12/84caa68576e345eb5e7ae61a0e5a9229eb100d7b/commons-compress-1.12.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.commons/commons-compress/1.12/84caa68576e345eb5e7ae61a0e5a9229eb100d7b/commons-compress-1.12.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.commons/commons-compress/1.12/84caa68576e345eb5e7ae61a0e5a9229eb100d7b/commons-compress-1.12.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.commons/commons-compress/1.12/84caa68576e345eb5e7ae61a0e5a9229eb100d7b/commons-compress-1.12.jar</p> <p> Dependency Hierarchy: - lint-gradle-26.5.1.jar (Root Library) - builder-3.5.1.jar - sdklib-26.5.1.jar - :x: **commons-compress-1.12.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/jitrapon/glom-android/commit/fe568e5752e24693f6826e5ecd7694b4a426cb26">fe568e5752e24693f6826e5ecd7694b4a426cb26</a></p> <p>Found in base branch: <b>develop</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> When reading a specially crafted 7Z archive, the construction of the list of codecs that decompress an entry can result in an infinite loop. This could be used to mount a denial of service attack against services that use Compress' sevenz package. <p>Publish Date: 2021-07-13 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-35515>CVE-2021-35515</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://commons.apache.org/proper/commons-compress/security-reports.html">https://commons.apache.org/proper/commons-compress/security-reports.html</a></p> <p>Release Date: 2021-07-13</p> <p>Fix Resolution: org.apache.commons:commons-compress:1.21</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in commons compress jar cve high severity vulnerability vulnerable library commons compress jar apache commons compress software defines an api for working with compression and archive formats these include gzip lzma xz snappy traditional unix compress deflate and ar cpio jar tar zip dump arj path to dependency file auth build gradle path to vulnerable library home wss scanner gradle caches modules files org apache commons commons compress commons compress jar home wss scanner gradle caches modules files org apache commons commons compress commons compress jar home wss scanner gradle caches modules files org apache commons commons compress commons compress jar home wss scanner gradle caches modules files org apache commons commons compress commons compress jar home wss scanner gradle caches modules files org apache commons commons compress commons compress jar home wss scanner gradle caches modules files org apache commons commons compress commons compress jar home wss scanner gradle caches modules files org apache commons commons compress commons compress jar dependency hierarchy lint gradle jar root library builder jar sdklib jar x commons compress jar vulnerable library found in head commit a href found in base branch develop vulnerability details when reading a specially crafted archive the construction of the list of codecs that decompress an entry can result in an infinite loop this could be used to mount a denial of service attack against services that use compress sevenz package publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org apache commons commons compress step up your open source security game with whitesource
0
86,931
17,106,078,444
IssuesEvent
2021-07-09 17:58:09
dotnet/runtime
https://api.github.com/repos/dotnet/runtime
closed
Potential performance regression in the `*IterateForEach*Span*` benchmarks
amd-perf arch-arm64 area-CodeGen-coreclr tenet-performance untriaged
While doing the .NET 5 vs .NET 6 preview 7 manual perf run I've found something that seems to be ARM64, ARM and AMD (x64) specific regression. Repro: ```cmd py .\scripts\benchmarks_ci.py -f net5.0 net6.0 --filter "System.Collections.IterateForEach<int32>.ReadOnlySpan" --bdn-arguments "--disasm true --memoryRandomization true" ``` Results from multiple machines: <details> ## System.Collections.IterateForEach<String>.ReadOnlySpan(Size: 512) | Result | Base | Diff | Ratio | Alloc Delta | Modality | Operating System | Bit | Processor Name | Base V | Diff V | | ------ | ------:| -------:| -----:| -----------:| -------- | ----------------------- | ----- | --------------------------------------------- | ------------- | ------------ | | Slower | 125.03 | 1103.94 | 0.11 | +0 | | Windows 10.0.19041.1052 | X64 | AMD Ryzen Threadripper PRO 3945WX 12-Cores | 5.0.721.25508 | 6.0.21.35216| | Same | 216.85 | 219.31 | 0.99 | +0 | | Windows 10.0.18363.1621 | X64 | Intel Xeon CPU E5-1650 v4 3.60GHz | 5.0.721.25508 | 6.0.21.32901| | Same | 241.37 | 241.29 | 1.00 | +0 | | Windows 10.0.19043.1052 | X64 | Intel Core i5-8500 CPU 3.00GHz (Coffee Lake) | 5.0.721.25508 | 6.0.21.32802| | Same | 241.67 | 242.53 | 1.00 | +0 | | Windows 10.0.19042.685 | X64 | Intel Core i7-5557U CPU 3.10GHz (Broadwell) | 5.0.721.25508 | 6.0.21.32901| | Same | 279.40 | 284.73 | 0.98 | +0 | bimodal | Windows 10.0.19043.1052 | X64 | Intel Core i7-8650U CPU 1.90GHz (Kaby Lake R) | 5.0.721.25508 | 6.0.21.32802| | Same | 320.13 | 311.72 | 1.03 | +0 | several? | Windows 10.0.22000 | X64 | Intel Core i7-8650U CPU 1.90GHz (Kaby Lake R) | 5.0.721.25508 | 6.0.21.32901| | Slower | 189.81 | 215.37 | 0.88 | +0 | | Windows 10.0.22000 | X64 | Intel Core i7-8700 CPU 3.20GHz (Coffee Lake) | 5.0.721.25508 | 6.0.21.32802| | Same | 407.89 | 394.83 | 1.03 | +0 | | Windows 7 SP1 | X64 | Intel Core2 Duo CPU T9600 2.80GHz | 5.0.721.25508 | 6.0.21.32901| | Same | 204.40 | 200.56 | 1.02 | +0 | | ubuntu 18.04 | X64 | Intel Xeon CPU E5-1650 v4 3.60GHz | 5.0.721.25508 | 6.0.21.32901| | Slower | 403.53 | 5274.27 | 0.08 | +0 | | ubuntu 16.04 | Arm64 | Unknown processor | 5.0.721.25508 | 6.0.21.35701| | Same | 352.76 | 352.49 | 1.00 | +0 | | Windows 10.0.19043.1052 | Arm64 | Microsoft SQ1 3.0 GHz | 5.0.721.25508 | 6.0.21.32901| | Same | 140.73 | 139.72 | 1.01 | +0 | | Windows 10.0.18363.1621 | X86 | Intel Xeon CPU E5-1650 v4 3.60GHz | 5.0.721.25508 | 6.0.21.32901| | Slower | 329.66 | 1394.41 | 0.24 | +0 | | Windows 10.0.19043.1052 | Arm | Microsoft SQ1 3.0 GHz | 5.0.721.25508 | 6.0.21.35216| | Same | 331.44 | 330.27 | 1.00 | +0 | | macOS Big Sur 11.3.1 | X64 | Intel Core i5-4278U CPU 2.60GHz (Haswell) | 5.0.721.25508 | 6.0.21.32901| | Same | 323.04 | 322.33 | 1.00 | +0 | | macOS Big Sur 11.4 | X64 | Intel Core i5-4278U CPU 2.60GHz (Haswell) | 5.0.721.25508 | 6.0.21.32901| | Same | 239.51 | 238.36 | 1.00 | +0 | | macOS Big Sur 11.4 | X64 | Intel Core i7-5557U CPU 3.10GHz (Broadwell) | 5.0.721.25508 | 6.0.21.32901| ## System.Collections.IterateForEach<Int32>.ReadOnlySpan(Size: 512) | Result | Base | Diff | Ratio | Alloc Delta | Modality | Operating System | Bit | Processor Name | Base V | Diff V | | ------ | ------:| -------:| -----:| -----------:| --------:| ----------------------- | ----- | --------------------------------------------- | ------------- | ------------ | | Slower | 123.26 | 1108.25 | 0.11 | +0 | | Windows 10.0.19041.1052 | X64 | AMD Ryzen Threadripper PRO 3945WX 12-Cores | 5.0.721.25508 | 6.0.21.35216| | Same | 208.98 | 203.03 | 1.03 | +0 | | Windows 10.0.18363.1621 | X64 | Intel Xeon CPU E5-1650 v4 3.60GHz | 5.0.721.25508 | 6.0.21.32901| | Same | 166.68 | 160.38 | 1.04 | +0 | | Windows 10.0.19043.1052 | X64 | Intel Core i5-8500 CPU 3.00GHz (Coffee Lake) | 5.0.721.25508 | 6.0.21.32802| | Same | 233.36 | 229.13 | 1.02 | +0 | | Windows 10.0.19042.685 | X64 | Intel Core i7-5557U CPU 3.10GHz (Broadwell) | 5.0.721.25508 | 6.0.21.32901| | Slower | 250.30 | 282.27 | 0.89 | +0 | | Windows 10.0.19043.1052 | X64 | Intel Core i7-8650U CPU 1.90GHz (Kaby Lake R) | 5.0.721.25508 | 6.0.21.32802| | Slower | 251.59 | 285.56 | 0.88 | +0 | | Windows 10.0.22000 | X64 | Intel Core i7-8650U CPU 1.90GHz (Kaby Lake R) | 5.0.721.25508 | 6.0.21.32901| | Same | 192.04 | 213.50 | 0.90 | +0 | | Windows 10.0.22000 | X64 | Intel Core i7-8700 CPU 3.20GHz (Coffee Lake) | 5.0.721.25508 | 6.0.21.32802| | Same | 403.58 | 405.14 | 1.00 | +0 | | Windows 7 SP1 | X64 | Intel Core2 Duo CPU T9600 2.80GHz | 5.0.721.25508 | 6.0.21.32901| | Same | 196.03 | 199.04 | 0.98 | +0 | | ubuntu 18.04 | X64 | Intel Xeon CPU E5-1650 v4 3.60GHz | 5.0.721.25508 | 6.0.21.32901| | Slower | 395.46 | 4943.41 | 0.08 | +0 | | ubuntu 16.04 | Arm64 | Unknown processor | 5.0.721.25508 | 6.0.21.35701| | Same | 346.01 | 332.33 | 1.04 | +0 | | Windows 10.0.19043.1052 | Arm64 | Microsoft SQ1 3.0 GHz | 5.0.721.25508 | 6.0.21.32901| | Same | 143.67 | 143.86 | 1.00 | +0 | | Windows 10.0.18363.1621 | X86 | Intel Xeon CPU E5-1650 v4 3.60GHz | 5.0.721.25508 | 6.0.21.32901| | Slower | 346.26 | 1362.83 | 0.25 | +0 | | Windows 10.0.19043.1052 | Arm | Microsoft SQ1 3.0 GHz | 5.0.721.25508 | 6.0.21.35216| | Same | 326.15 | 324.09 | 1.01 | +0 | | macOS Big Sur 11.3.1 | X64 | Intel Core i5-4278U CPU 2.60GHz (Haswell) | 5.0.721.25508 | 6.0.21.32901| | Same | 318.47 | 315.87 | 1.01 | +0 | | macOS Big Sur 11.4 | X64 | Intel Core i5-4278U CPU 2.60GHz (Haswell) | 5.0.721.25508 | 6.0.21.32901| | Same | 230.46 | 228.78 | 1.01 | +0 | | macOS Big Sur 11.4 | X64 | Intel Core i7-5557U CPU 3.10GHz (Broadwell) | 5.0.721.25508 | 6.0.21.32901| ## System.Collections.IterateForEach<String>.Span(Size: 512) | Result | Base | Diff | Ratio | Alloc Delta | Modality | Operating System | Bit | Processor Name | Base V | Diff V | | ------ | ------:| -------:| -----:| -----------:| --------:| ----------------------- | ----- | --------------------------------------------- | ------------- | ------------ | | Slower | 127.87 | 1111.12 | 0.12 | +0 | | Windows 10.0.19041.1052 | X64 | AMD Ryzen Threadripper PRO 3945WX 12-Cores | 5.0.721.25508 | 6.0.21.35216| | Same | 216.69 | 210.35 | 1.03 | +0 | | Windows 10.0.18363.1621 | X64 | Intel Xeon CPU E5-1650 v4 3.60GHz | 5.0.721.25508 | 6.0.21.32901| | Slower | 186.30 | 241.93 | 0.77 | +0 | | Windows 10.0.19043.1052 | X64 | Intel Core i5-8500 CPU 3.00GHz (Coffee Lake) | 5.0.721.25508 | 6.0.21.32802| | Same | 241.10 | 234.05 | 1.03 | +0 | | Windows 10.0.19042.685 | X64 | Intel Core i7-5557U CPU 3.10GHz (Broadwell) | 5.0.721.25508 | 6.0.21.32901| | Same | 275.56 | 269.14 | 1.02 | +0 | | Windows 10.0.19043.1052 | X64 | Intel Core i7-8650U CPU 1.90GHz (Kaby Lake R) | 5.0.721.25508 | 6.0.21.32802| | Faster | 299.24 | 190.93 | 1.57 | +0 | | Windows 10.0.22000 | X64 | Intel Core i7-8650U CPU 1.90GHz (Kaby Lake R) | 5.0.721.25508 | 6.0.21.32901| | Slower | 183.80 | 207.79 | 0.88 | +0 | | Windows 10.0.22000 | X64 | Intel Core i7-8700 CPU 3.20GHz (Coffee Lake) | 5.0.721.25508 | 6.0.21.32802| | Same | 410.40 | 405.76 | 1.01 | +0 | | Windows 7 SP1 | X64 | Intel Core2 Duo CPU T9600 2.80GHz | 5.0.721.25508 | 6.0.21.32901| | Same | 207.41 | 206.67 | 1.00 | +0 | | ubuntu 18.04 | X64 | Intel Xeon CPU E5-1650 v4 3.60GHz | 5.0.721.25508 | 6.0.21.32901| | Slower | 418.07 | 5286.05 | 0.08 | +0 | | ubuntu 16.04 | Arm64 | Unknown processor | 5.0.721.25508 | 6.0.21.35701| | Same | 339.92 | 360.51 | 0.94 | +0 | | Windows 10.0.19043.1052 | Arm64 | Microsoft SQ1 3.0 GHz | 5.0.721.25508 | 6.0.21.32901| | Same | 151.40 | 150.49 | 1.01 | +0 | | Windows 10.0.18363.1621 | X86 | Intel Xeon CPU E5-1650 v4 3.60GHz | 5.0.721.25508 | 6.0.21.32901| | Slower | 332.07 | 1380.42 | 0.24 | +0 | | Windows 10.0.19043.1052 | Arm | Microsoft SQ1 3.0 GHz | 5.0.721.25508 | 6.0.21.35216| | Same | 335.51 | 334.64 | 1.00 | +0 | | macOS Big Sur 11.3.1 | X64 | Intel Core i5-4278U CPU 2.60GHz (Haswell) | 5.0.721.25508 | 6.0.21.32901| | Same | 327.04 | 327.25 | 1.00 | +0 | | macOS Big Sur 11.4 | X64 | Intel Core i5-4278U CPU 2.60GHz (Haswell) | 5.0.721.25508 | 6.0.21.32901| | Same | 241.14 | 240.91 | 1.00 | +0 | | macOS Big Sur 11.4 | X64 | Intel Core i7-5557U CPU 3.10GHz (Broadwell) | 5.0.721.25508 | 6.0.21.32901| ## System.Collections.IterateForEach<Int32>.Span(Size: 512) | Result | Base | Diff | Ratio | Alloc Delta | Modality | Operating System | Bit | Processor Name | Base V | Diff V | | ------ | ------:| -------:| -----:| -----------:| -------- | ----------------------- | ----- | --------------------------------------------- | ------------- | ------------ | | Slower | 123.08 | 1109.80 | 0.11 | +0 | | Windows 10.0.19041.1052 | X64 | AMD Ryzen Threadripper PRO 3945WX 12-Cores | 5.0.721.25508 | 6.0.21.35216| | Same | 208.99 | 202.05 | 1.03 | +0 | | Windows 10.0.18363.1621 | X64 | Intel Xeon CPU E5-1650 v4 3.60GHz | 5.0.721.25508 | 6.0.21.32901| | Same | 168.16 | 159.26 | 1.06 | +0 | | Windows 10.0.19043.1052 | X64 | Intel Core i5-8500 CPU 3.00GHz (Coffee Lake) | 5.0.721.25508 | 6.0.21.32802| | Same | 233.38 | 229.84 | 1.02 | +0 | | Windows 10.0.19042.685 | X64 | Intel Core i7-5557U CPU 3.10GHz (Broadwell) | 5.0.721.25508 | 6.0.21.32901| | Same | 252.07 | 283.22 | 0.89 | +0 | bimodal | Windows 10.0.19043.1052 | X64 | Intel Core i7-8650U CPU 1.90GHz (Kaby Lake R) | 5.0.721.25508 | 6.0.21.32802| | Slower | 246.32 | 283.00 | 0.87 | +0 | | Windows 10.0.22000 | X64 | Intel Core i7-8650U CPU 1.90GHz (Kaby Lake R) | 5.0.721.25508 | 6.0.21.32901| | Same | 209.99 | 212.25 | 0.99 | +0 | | Windows 10.0.22000 | X64 | Intel Core i7-8700 CPU 3.20GHz (Coffee Lake) | 5.0.721.25508 | 6.0.21.32802| | Same | 403.82 | 405.26 | 1.00 | +0 | | Windows 7 SP1 | X64 | Intel Core2 Duo CPU T9600 2.80GHz | 5.0.721.25508 | 6.0.21.32901| | Same | 196.18 | 199.00 | 0.99 | +0 | | ubuntu 18.04 | X64 | Intel Xeon CPU E5-1650 v4 3.60GHz | 5.0.721.25508 | 6.0.21.32901| | Slower | 395.45 | 5200.84 | 0.08 | +0 | | ubuntu 16.04 | Arm64 | Unknown processor | 5.0.721.25508 | 6.0.21.35701| | Same | 332.26 | 345.87 | 0.96 | +0 | | Windows 10.0.19043.1052 | Arm64 | Microsoft SQ1 3.0 GHz | 5.0.721.25508 | 6.0.21.32901| | Same | 143.98 | 143.81 | 1.00 | +0 | | Windows 10.0.18363.1621 | X86 | Intel Xeon CPU E5-1650 v4 3.60GHz | 5.0.721.25508 | 6.0.21.32901| | Slower | 346.31 | 1363.60 | 0.25 | +0 | | Windows 10.0.19043.1052 | Arm | Microsoft SQ1 3.0 GHz | 5.0.721.25508 | 6.0.21.35216| | Same | 326.52 | 323.78 | 1.01 | +0 | | macOS Big Sur 11.3.1 | X64 | Intel Core i5-4278U CPU 2.60GHz (Haswell) | 5.0.721.25508 | 6.0.21.32901| | Same | 318.34 | 315.92 | 1.01 | +0 | | macOS Big Sur 11.4 | X64 | Intel Core i5-4278U CPU 2.60GHz (Haswell) | 5.0.721.25508 | 6.0.21.32901| | Same | 230.54 | 228.77 | 1.01 | +0 | | macOS Big Sur 11.4 | X64 | Intel Core i7-5557U CPU 3.10GHz (Broadwell) | 5.0.721.25508 | 6.0.21.32901| </details> Disassembly from my AMD machine: <details> ## .NET 5.0.7 (5.0.721.25508), X64 RyuJIT ```assembly ; System.Collections.IterateForEach`1[[System.Int32, System.Private.CoreLib]].ReadOnlySpan() xor eax,eax mov rdx,[rcx+8] test rdx,rdx jne short M00_L00 xor ecx,ecx xor r8d,r8d jmp short M00_L01 M00_L00: lea rcx,[rdx+10] mov r8d,[rdx+8] M00_L01: xor edx,edx test r8d,r8d jle short M00_L03 M00_L02: movsxd rax,edx mov eax,[rcx+rax*4] inc edx cmp edx,r8d jl short M00_L02 M00_L03: ret ; Total bytes of code 47 ``` ## .NET 6.0.0 (6.0.21.35701), X64 RyuJIT ```assembly ; System.Collections.IterateForEach`1[[System.Int32, System.Private.CoreLib]].ReadOnlySpan() sub rsp,58 vzeroupper vxorps xmm4,xmm4,xmm4 vmovdqa xmmword ptr [rsp+30],xmm4 vmovdqa xmmword ptr [rsp+40],xmm4 xor eax,eax mov [rsp+54],eax mov rax,[rcx+8] test rax,rax jne short M00_L00 vxorps xmm0,xmm0,xmm0 vmovdqu xmmword ptr [rsp+40],xmm0 jmp short M00_L01 M00_L00: lea rdx,[rax+10] mov [rsp+40],rdx mov eax,[rax+8] mov [rsp+48],eax M00_L01: mov rax,[rsp+40] mov [rsp+30],rax mov eax,[rsp+48] mov [rsp+38],eax xor eax,eax mov [rsp+2C],eax cmp dword ptr [rsp+38],0 jle short M00_L03 M00_L02: mov eax,[rsp+38] cmp [rsp+2C],eax jae short M00_L04 mov rax,[rsp+30] mov edx,[rsp+2C] movsxd rdx,edx mov eax,[rax+rdx*4] mov [rsp+28],eax mov eax,[rsp+28] mov [rsp+54],eax mov eax,[rsp+2C] inc eax mov [rsp+2C],eax mov eax,[rsp+2C] cmp eax,[rsp+38] jl short M00_L02 M00_L03: mov eax,[rsp+54] add rsp,58 ret M00_L04: call CORINFO_HELP_RNGCHKFAIL int 3 ; Total bytes of code 169 ``` </details> cc @kunalspathak @AndyAyersMS @DrewScoggins
1.0
Potential performance regression in the `*IterateForEach*Span*` benchmarks - While doing the .NET 5 vs .NET 6 preview 7 manual perf run I've found something that seems to be ARM64, ARM and AMD (x64) specific regression. Repro: ```cmd py .\scripts\benchmarks_ci.py -f net5.0 net6.0 --filter "System.Collections.IterateForEach<int32>.ReadOnlySpan" --bdn-arguments "--disasm true --memoryRandomization true" ``` Results from multiple machines: <details> ## System.Collections.IterateForEach<String>.ReadOnlySpan(Size: 512) | Result | Base | Diff | Ratio | Alloc Delta | Modality | Operating System | Bit | Processor Name | Base V | Diff V | | ------ | ------:| -------:| -----:| -----------:| -------- | ----------------------- | ----- | --------------------------------------------- | ------------- | ------------ | | Slower | 125.03 | 1103.94 | 0.11 | +0 | | Windows 10.0.19041.1052 | X64 | AMD Ryzen Threadripper PRO 3945WX 12-Cores | 5.0.721.25508 | 6.0.21.35216| | Same | 216.85 | 219.31 | 0.99 | +0 | | Windows 10.0.18363.1621 | X64 | Intel Xeon CPU E5-1650 v4 3.60GHz | 5.0.721.25508 | 6.0.21.32901| | Same | 241.37 | 241.29 | 1.00 | +0 | | Windows 10.0.19043.1052 | X64 | Intel Core i5-8500 CPU 3.00GHz (Coffee Lake) | 5.0.721.25508 | 6.0.21.32802| | Same | 241.67 | 242.53 | 1.00 | +0 | | Windows 10.0.19042.685 | X64 | Intel Core i7-5557U CPU 3.10GHz (Broadwell) | 5.0.721.25508 | 6.0.21.32901| | Same | 279.40 | 284.73 | 0.98 | +0 | bimodal | Windows 10.0.19043.1052 | X64 | Intel Core i7-8650U CPU 1.90GHz (Kaby Lake R) | 5.0.721.25508 | 6.0.21.32802| | Same | 320.13 | 311.72 | 1.03 | +0 | several? | Windows 10.0.22000 | X64 | Intel Core i7-8650U CPU 1.90GHz (Kaby Lake R) | 5.0.721.25508 | 6.0.21.32901| | Slower | 189.81 | 215.37 | 0.88 | +0 | | Windows 10.0.22000 | X64 | Intel Core i7-8700 CPU 3.20GHz (Coffee Lake) | 5.0.721.25508 | 6.0.21.32802| | Same | 407.89 | 394.83 | 1.03 | +0 | | Windows 7 SP1 | X64 | Intel Core2 Duo CPU T9600 2.80GHz | 5.0.721.25508 | 6.0.21.32901| | Same | 204.40 | 200.56 | 1.02 | +0 | | ubuntu 18.04 | X64 | Intel Xeon CPU E5-1650 v4 3.60GHz | 5.0.721.25508 | 6.0.21.32901| | Slower | 403.53 | 5274.27 | 0.08 | +0 | | ubuntu 16.04 | Arm64 | Unknown processor | 5.0.721.25508 | 6.0.21.35701| | Same | 352.76 | 352.49 | 1.00 | +0 | | Windows 10.0.19043.1052 | Arm64 | Microsoft SQ1 3.0 GHz | 5.0.721.25508 | 6.0.21.32901| | Same | 140.73 | 139.72 | 1.01 | +0 | | Windows 10.0.18363.1621 | X86 | Intel Xeon CPU E5-1650 v4 3.60GHz | 5.0.721.25508 | 6.0.21.32901| | Slower | 329.66 | 1394.41 | 0.24 | +0 | | Windows 10.0.19043.1052 | Arm | Microsoft SQ1 3.0 GHz | 5.0.721.25508 | 6.0.21.35216| | Same | 331.44 | 330.27 | 1.00 | +0 | | macOS Big Sur 11.3.1 | X64 | Intel Core i5-4278U CPU 2.60GHz (Haswell) | 5.0.721.25508 | 6.0.21.32901| | Same | 323.04 | 322.33 | 1.00 | +0 | | macOS Big Sur 11.4 | X64 | Intel Core i5-4278U CPU 2.60GHz (Haswell) | 5.0.721.25508 | 6.0.21.32901| | Same | 239.51 | 238.36 | 1.00 | +0 | | macOS Big Sur 11.4 | X64 | Intel Core i7-5557U CPU 3.10GHz (Broadwell) | 5.0.721.25508 | 6.0.21.32901| ## System.Collections.IterateForEach<Int32>.ReadOnlySpan(Size: 512) | Result | Base | Diff | Ratio | Alloc Delta | Modality | Operating System | Bit | Processor Name | Base V | Diff V | | ------ | ------:| -------:| -----:| -----------:| --------:| ----------------------- | ----- | --------------------------------------------- | ------------- | ------------ | | Slower | 123.26 | 1108.25 | 0.11 | +0 | | Windows 10.0.19041.1052 | X64 | AMD Ryzen Threadripper PRO 3945WX 12-Cores | 5.0.721.25508 | 6.0.21.35216| | Same | 208.98 | 203.03 | 1.03 | +0 | | Windows 10.0.18363.1621 | X64 | Intel Xeon CPU E5-1650 v4 3.60GHz | 5.0.721.25508 | 6.0.21.32901| | Same | 166.68 | 160.38 | 1.04 | +0 | | Windows 10.0.19043.1052 | X64 | Intel Core i5-8500 CPU 3.00GHz (Coffee Lake) | 5.0.721.25508 | 6.0.21.32802| | Same | 233.36 | 229.13 | 1.02 | +0 | | Windows 10.0.19042.685 | X64 | Intel Core i7-5557U CPU 3.10GHz (Broadwell) | 5.0.721.25508 | 6.0.21.32901| | Slower | 250.30 | 282.27 | 0.89 | +0 | | Windows 10.0.19043.1052 | X64 | Intel Core i7-8650U CPU 1.90GHz (Kaby Lake R) | 5.0.721.25508 | 6.0.21.32802| | Slower | 251.59 | 285.56 | 0.88 | +0 | | Windows 10.0.22000 | X64 | Intel Core i7-8650U CPU 1.90GHz (Kaby Lake R) | 5.0.721.25508 | 6.0.21.32901| | Same | 192.04 | 213.50 | 0.90 | +0 | | Windows 10.0.22000 | X64 | Intel Core i7-8700 CPU 3.20GHz (Coffee Lake) | 5.0.721.25508 | 6.0.21.32802| | Same | 403.58 | 405.14 | 1.00 | +0 | | Windows 7 SP1 | X64 | Intel Core2 Duo CPU T9600 2.80GHz | 5.0.721.25508 | 6.0.21.32901| | Same | 196.03 | 199.04 | 0.98 | +0 | | ubuntu 18.04 | X64 | Intel Xeon CPU E5-1650 v4 3.60GHz | 5.0.721.25508 | 6.0.21.32901| | Slower | 395.46 | 4943.41 | 0.08 | +0 | | ubuntu 16.04 | Arm64 | Unknown processor | 5.0.721.25508 | 6.0.21.35701| | Same | 346.01 | 332.33 | 1.04 | +0 | | Windows 10.0.19043.1052 | Arm64 | Microsoft SQ1 3.0 GHz | 5.0.721.25508 | 6.0.21.32901| | Same | 143.67 | 143.86 | 1.00 | +0 | | Windows 10.0.18363.1621 | X86 | Intel Xeon CPU E5-1650 v4 3.60GHz | 5.0.721.25508 | 6.0.21.32901| | Slower | 346.26 | 1362.83 | 0.25 | +0 | | Windows 10.0.19043.1052 | Arm | Microsoft SQ1 3.0 GHz | 5.0.721.25508 | 6.0.21.35216| | Same | 326.15 | 324.09 | 1.01 | +0 | | macOS Big Sur 11.3.1 | X64 | Intel Core i5-4278U CPU 2.60GHz (Haswell) | 5.0.721.25508 | 6.0.21.32901| | Same | 318.47 | 315.87 | 1.01 | +0 | | macOS Big Sur 11.4 | X64 | Intel Core i5-4278U CPU 2.60GHz (Haswell) | 5.0.721.25508 | 6.0.21.32901| | Same | 230.46 | 228.78 | 1.01 | +0 | | macOS Big Sur 11.4 | X64 | Intel Core i7-5557U CPU 3.10GHz (Broadwell) | 5.0.721.25508 | 6.0.21.32901| ## System.Collections.IterateForEach<String>.Span(Size: 512) | Result | Base | Diff | Ratio | Alloc Delta | Modality | Operating System | Bit | Processor Name | Base V | Diff V | | ------ | ------:| -------:| -----:| -----------:| --------:| ----------------------- | ----- | --------------------------------------------- | ------------- | ------------ | | Slower | 127.87 | 1111.12 | 0.12 | +0 | | Windows 10.0.19041.1052 | X64 | AMD Ryzen Threadripper PRO 3945WX 12-Cores | 5.0.721.25508 | 6.0.21.35216| | Same | 216.69 | 210.35 | 1.03 | +0 | | Windows 10.0.18363.1621 | X64 | Intel Xeon CPU E5-1650 v4 3.60GHz | 5.0.721.25508 | 6.0.21.32901| | Slower | 186.30 | 241.93 | 0.77 | +0 | | Windows 10.0.19043.1052 | X64 | Intel Core i5-8500 CPU 3.00GHz (Coffee Lake) | 5.0.721.25508 | 6.0.21.32802| | Same | 241.10 | 234.05 | 1.03 | +0 | | Windows 10.0.19042.685 | X64 | Intel Core i7-5557U CPU 3.10GHz (Broadwell) | 5.0.721.25508 | 6.0.21.32901| | Same | 275.56 | 269.14 | 1.02 | +0 | | Windows 10.0.19043.1052 | X64 | Intel Core i7-8650U CPU 1.90GHz (Kaby Lake R) | 5.0.721.25508 | 6.0.21.32802| | Faster | 299.24 | 190.93 | 1.57 | +0 | | Windows 10.0.22000 | X64 | Intel Core i7-8650U CPU 1.90GHz (Kaby Lake R) | 5.0.721.25508 | 6.0.21.32901| | Slower | 183.80 | 207.79 | 0.88 | +0 | | Windows 10.0.22000 | X64 | Intel Core i7-8700 CPU 3.20GHz (Coffee Lake) | 5.0.721.25508 | 6.0.21.32802| | Same | 410.40 | 405.76 | 1.01 | +0 | | Windows 7 SP1 | X64 | Intel Core2 Duo CPU T9600 2.80GHz | 5.0.721.25508 | 6.0.21.32901| | Same | 207.41 | 206.67 | 1.00 | +0 | | ubuntu 18.04 | X64 | Intel Xeon CPU E5-1650 v4 3.60GHz | 5.0.721.25508 | 6.0.21.32901| | Slower | 418.07 | 5286.05 | 0.08 | +0 | | ubuntu 16.04 | Arm64 | Unknown processor | 5.0.721.25508 | 6.0.21.35701| | Same | 339.92 | 360.51 | 0.94 | +0 | | Windows 10.0.19043.1052 | Arm64 | Microsoft SQ1 3.0 GHz | 5.0.721.25508 | 6.0.21.32901| | Same | 151.40 | 150.49 | 1.01 | +0 | | Windows 10.0.18363.1621 | X86 | Intel Xeon CPU E5-1650 v4 3.60GHz | 5.0.721.25508 | 6.0.21.32901| | Slower | 332.07 | 1380.42 | 0.24 | +0 | | Windows 10.0.19043.1052 | Arm | Microsoft SQ1 3.0 GHz | 5.0.721.25508 | 6.0.21.35216| | Same | 335.51 | 334.64 | 1.00 | +0 | | macOS Big Sur 11.3.1 | X64 | Intel Core i5-4278U CPU 2.60GHz (Haswell) | 5.0.721.25508 | 6.0.21.32901| | Same | 327.04 | 327.25 | 1.00 | +0 | | macOS Big Sur 11.4 | X64 | Intel Core i5-4278U CPU 2.60GHz (Haswell) | 5.0.721.25508 | 6.0.21.32901| | Same | 241.14 | 240.91 | 1.00 | +0 | | macOS Big Sur 11.4 | X64 | Intel Core i7-5557U CPU 3.10GHz (Broadwell) | 5.0.721.25508 | 6.0.21.32901| ## System.Collections.IterateForEach<Int32>.Span(Size: 512) | Result | Base | Diff | Ratio | Alloc Delta | Modality | Operating System | Bit | Processor Name | Base V | Diff V | | ------ | ------:| -------:| -----:| -----------:| -------- | ----------------------- | ----- | --------------------------------------------- | ------------- | ------------ | | Slower | 123.08 | 1109.80 | 0.11 | +0 | | Windows 10.0.19041.1052 | X64 | AMD Ryzen Threadripper PRO 3945WX 12-Cores | 5.0.721.25508 | 6.0.21.35216| | Same | 208.99 | 202.05 | 1.03 | +0 | | Windows 10.0.18363.1621 | X64 | Intel Xeon CPU E5-1650 v4 3.60GHz | 5.0.721.25508 | 6.0.21.32901| | Same | 168.16 | 159.26 | 1.06 | +0 | | Windows 10.0.19043.1052 | X64 | Intel Core i5-8500 CPU 3.00GHz (Coffee Lake) | 5.0.721.25508 | 6.0.21.32802| | Same | 233.38 | 229.84 | 1.02 | +0 | | Windows 10.0.19042.685 | X64 | Intel Core i7-5557U CPU 3.10GHz (Broadwell) | 5.0.721.25508 | 6.0.21.32901| | Same | 252.07 | 283.22 | 0.89 | +0 | bimodal | Windows 10.0.19043.1052 | X64 | Intel Core i7-8650U CPU 1.90GHz (Kaby Lake R) | 5.0.721.25508 | 6.0.21.32802| | Slower | 246.32 | 283.00 | 0.87 | +0 | | Windows 10.0.22000 | X64 | Intel Core i7-8650U CPU 1.90GHz (Kaby Lake R) | 5.0.721.25508 | 6.0.21.32901| | Same | 209.99 | 212.25 | 0.99 | +0 | | Windows 10.0.22000 | X64 | Intel Core i7-8700 CPU 3.20GHz (Coffee Lake) | 5.0.721.25508 | 6.0.21.32802| | Same | 403.82 | 405.26 | 1.00 | +0 | | Windows 7 SP1 | X64 | Intel Core2 Duo CPU T9600 2.80GHz | 5.0.721.25508 | 6.0.21.32901| | Same | 196.18 | 199.00 | 0.99 | +0 | | ubuntu 18.04 | X64 | Intel Xeon CPU E5-1650 v4 3.60GHz | 5.0.721.25508 | 6.0.21.32901| | Slower | 395.45 | 5200.84 | 0.08 | +0 | | ubuntu 16.04 | Arm64 | Unknown processor | 5.0.721.25508 | 6.0.21.35701| | Same | 332.26 | 345.87 | 0.96 | +0 | | Windows 10.0.19043.1052 | Arm64 | Microsoft SQ1 3.0 GHz | 5.0.721.25508 | 6.0.21.32901| | Same | 143.98 | 143.81 | 1.00 | +0 | | Windows 10.0.18363.1621 | X86 | Intel Xeon CPU E5-1650 v4 3.60GHz | 5.0.721.25508 | 6.0.21.32901| | Slower | 346.31 | 1363.60 | 0.25 | +0 | | Windows 10.0.19043.1052 | Arm | Microsoft SQ1 3.0 GHz | 5.0.721.25508 | 6.0.21.35216| | Same | 326.52 | 323.78 | 1.01 | +0 | | macOS Big Sur 11.3.1 | X64 | Intel Core i5-4278U CPU 2.60GHz (Haswell) | 5.0.721.25508 | 6.0.21.32901| | Same | 318.34 | 315.92 | 1.01 | +0 | | macOS Big Sur 11.4 | X64 | Intel Core i5-4278U CPU 2.60GHz (Haswell) | 5.0.721.25508 | 6.0.21.32901| | Same | 230.54 | 228.77 | 1.01 | +0 | | macOS Big Sur 11.4 | X64 | Intel Core i7-5557U CPU 3.10GHz (Broadwell) | 5.0.721.25508 | 6.0.21.32901| </details> Disassembly from my AMD machine: <details> ## .NET 5.0.7 (5.0.721.25508), X64 RyuJIT ```assembly ; System.Collections.IterateForEach`1[[System.Int32, System.Private.CoreLib]].ReadOnlySpan() xor eax,eax mov rdx,[rcx+8] test rdx,rdx jne short M00_L00 xor ecx,ecx xor r8d,r8d jmp short M00_L01 M00_L00: lea rcx,[rdx+10] mov r8d,[rdx+8] M00_L01: xor edx,edx test r8d,r8d jle short M00_L03 M00_L02: movsxd rax,edx mov eax,[rcx+rax*4] inc edx cmp edx,r8d jl short M00_L02 M00_L03: ret ; Total bytes of code 47 ``` ## .NET 6.0.0 (6.0.21.35701), X64 RyuJIT ```assembly ; System.Collections.IterateForEach`1[[System.Int32, System.Private.CoreLib]].ReadOnlySpan() sub rsp,58 vzeroupper vxorps xmm4,xmm4,xmm4 vmovdqa xmmword ptr [rsp+30],xmm4 vmovdqa xmmword ptr [rsp+40],xmm4 xor eax,eax mov [rsp+54],eax mov rax,[rcx+8] test rax,rax jne short M00_L00 vxorps xmm0,xmm0,xmm0 vmovdqu xmmword ptr [rsp+40],xmm0 jmp short M00_L01 M00_L00: lea rdx,[rax+10] mov [rsp+40],rdx mov eax,[rax+8] mov [rsp+48],eax M00_L01: mov rax,[rsp+40] mov [rsp+30],rax mov eax,[rsp+48] mov [rsp+38],eax xor eax,eax mov [rsp+2C],eax cmp dword ptr [rsp+38],0 jle short M00_L03 M00_L02: mov eax,[rsp+38] cmp [rsp+2C],eax jae short M00_L04 mov rax,[rsp+30] mov edx,[rsp+2C] movsxd rdx,edx mov eax,[rax+rdx*4] mov [rsp+28],eax mov eax,[rsp+28] mov [rsp+54],eax mov eax,[rsp+2C] inc eax mov [rsp+2C],eax mov eax,[rsp+2C] cmp eax,[rsp+38] jl short M00_L02 M00_L03: mov eax,[rsp+54] add rsp,58 ret M00_L04: call CORINFO_HELP_RNGCHKFAIL int 3 ; Total bytes of code 169 ``` </details> cc @kunalspathak @AndyAyersMS @DrewScoggins
non_priority
potential performance regression in the iterateforeach span benchmarks while doing the net vs net preview manual perf run i ve found something that seems to be arm and amd specific regression repro cmd py scripts benchmarks ci py f filter system collections iterateforeach readonlyspan bdn arguments disasm true memoryrandomization true results from multiple machines system collections iterateforeach readonlyspan size result base diff ratio alloc delta modality operating system bit processor name base v diff v slower windows amd ryzen threadripper pro cores same windows intel xeon cpu same windows intel core cpu coffee lake same windows intel core cpu broadwell same bimodal windows intel core cpu kaby lake r same several windows intel core cpu kaby lake r slower windows intel core cpu coffee lake same windows intel duo cpu same ubuntu intel xeon cpu slower ubuntu unknown processor same windows microsoft ghz same windows intel xeon cpu slower windows arm microsoft ghz same macos big sur intel core cpu haswell same macos big sur intel core cpu haswell same macos big sur intel core cpu broadwell system collections iterateforeach readonlyspan size result base diff ratio alloc delta modality operating system bit processor name base v diff v slower windows amd ryzen threadripper pro cores same windows intel xeon cpu same windows intel core cpu coffee lake same windows intel core cpu broadwell slower windows intel core cpu kaby lake r slower windows intel core cpu kaby lake r same windows intel core cpu coffee lake same windows intel duo cpu same ubuntu intel xeon cpu slower ubuntu unknown processor same windows microsoft ghz same windows intel xeon cpu slower windows arm microsoft ghz same macos big sur intel core cpu haswell same macos big sur intel core cpu haswell same macos big sur intel core cpu broadwell system collections iterateforeach span size result base diff ratio alloc delta modality operating system bit processor name base v diff v slower windows amd ryzen threadripper pro cores same windows intel xeon cpu slower windows intel core cpu coffee lake same windows intel core cpu broadwell same windows intel core cpu kaby lake r faster windows intel core cpu kaby lake r slower windows intel core cpu coffee lake same windows intel duo cpu same ubuntu intel xeon cpu slower ubuntu unknown processor same windows microsoft ghz same windows intel xeon cpu slower windows arm microsoft ghz same macos big sur intel core cpu haswell same macos big sur intel core cpu haswell same macos big sur intel core cpu broadwell system collections iterateforeach span size result base diff ratio alloc delta modality operating system bit processor name base v diff v slower windows amd ryzen threadripper pro cores same windows intel xeon cpu same windows intel core cpu coffee lake same windows intel core cpu broadwell same bimodal windows intel core cpu kaby lake r slower windows intel core cpu kaby lake r same windows intel core cpu coffee lake same windows intel duo cpu same ubuntu intel xeon cpu slower ubuntu unknown processor same windows microsoft ghz same windows intel xeon cpu slower windows arm microsoft ghz same macos big sur intel core cpu haswell same macos big sur intel core cpu haswell same macos big sur intel core cpu broadwell disassembly from my amd machine net ryujit assembly system collections iterateforeach readonlyspan xor eax eax mov rdx test rdx rdx jne short xor ecx ecx xor jmp short lea rcx mov xor edx edx test jle short movsxd rax edx mov eax inc edx cmp edx jl short ret total bytes of code net ryujit assembly system collections iterateforeach readonlyspan sub rsp vzeroupper vxorps vmovdqa xmmword ptr vmovdqa xmmword ptr xor eax eax mov eax mov rax test rax rax jne short vxorps vmovdqu xmmword ptr jmp short lea rdx mov rdx mov eax mov eax mov rax mov rax mov eax mov eax xor eax eax mov eax cmp dword ptr jle short mov eax cmp eax jae short mov rax mov edx movsxd rdx edx mov eax mov eax mov eax mov eax mov eax inc eax mov eax mov eax cmp eax jl short mov eax add rsp ret call corinfo help rngchkfail int total bytes of code cc kunalspathak andyayersms drewscoggins
0
161,774
25,399,225,989
IssuesEvent
2022-11-22 10:49:18
team113/messenger
https://api.github.com/repos/team113/messenger
opened
Pagination
enhancement k::design k::refactor
## Background У любого списка должна быть пагинация. ## Problem to solve На данный момент список контактов, чатов и сообщений прогружает N элементов без возможности что-то догружать. Нужна пагинация. ## Possible solutions Исследовать каким образом можно удобно и универсально реализовать механизм пагинации элементов. При скролле вверх/вниз того или иного списка должны догружаться элементы - список чатов, список контактов и список сообщений.
1.0
Pagination - ## Background У любого списка должна быть пагинация. ## Problem to solve На данный момент список контактов, чатов и сообщений прогружает N элементов без возможности что-то догружать. Нужна пагинация. ## Possible solutions Исследовать каким образом можно удобно и универсально реализовать механизм пагинации элементов. При скролле вверх/вниз того или иного списка должны догружаться элементы - список чатов, список контактов и список сообщений.
non_priority
pagination background у любого списка должна быть пагинация problem to solve на данный момент список контактов чатов и сообщений прогружает n элементов без возможности что то догружать нужна пагинация possible solutions исследовать каким образом можно удобно и универсально реализовать механизм пагинации элементов при скролле вверх вниз того или иного списка должны догружаться элементы список чатов список контактов и список сообщений
0
85,545
15,755,010,487
IssuesEvent
2021-03-31 01:01:25
yaeljacobs67/fs-agent
https://api.github.com/repos/yaeljacobs67/fs-agent
opened
CVE-2021-23358 (High) detected in underscore-1.9.1.tgz
security vulnerability
## CVE-2021-23358 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>underscore-1.9.1.tgz</b></p></summary> <p>JavaScript's functional programming helper library.</p> <p>Library home page: <a href="https://registry.npmjs.org/underscore/-/underscore-1.9.1.tgz">https://registry.npmjs.org/underscore/-/underscore-1.9.1.tgz</a></p> <p>Path to dependency file: /fs-agent/test_input/ksa/ksa-web-root/ksa-web/src/main/webapp/rs/bootstrap/package.json</p> <p>Path to vulnerable library: fs-agent/test_input/ksa/ksa-web-root/ksa-web/src/main/webapp/rs/bootstrap/node_modules/underscore/package.json</p> <p> Dependency Hierarchy: - recess-1.0.3.tgz (Root Library) - :x: **underscore-1.9.1.tgz** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The package underscore from 1.13.0-0 and before 1.13.0-2, from 1.3.2 and before 1.12.1 are vulnerable to Arbitrary Code Execution via the template function, particularly when a variable property is passed as an argument as it is not sanitized. <p>Publish Date: 2021-03-29 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23358>CVE-2021-23358</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23358">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23358</a></p> <p>Release Date: 2021-03-29</p> <p>Fix Resolution: underscore - 1.12.1,1.13.0-2</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"underscore","packageVersion":"1.9.1","packageFilePaths":["/fs-agent/test_input/ksa/ksa-web-root/ksa-web/src/main/webapp/rs/bootstrap/package.json"],"isTransitiveDependency":true,"dependencyTree":"recess:1.0.3;underscore:1.9.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"underscore - 1.12.1,1.13.0-2"}],"baseBranches":[],"vulnerabilityIdentifier":"CVE-2021-23358","vulnerabilityDetails":"The package underscore from 1.13.0-0 and before 1.13.0-2, from 1.3.2 and before 1.12.1 are vulnerable to Arbitrary Code Execution via the template function, particularly when a variable property is passed as an argument as it is not sanitized.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23358","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
True
CVE-2021-23358 (High) detected in underscore-1.9.1.tgz - ## CVE-2021-23358 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>underscore-1.9.1.tgz</b></p></summary> <p>JavaScript's functional programming helper library.</p> <p>Library home page: <a href="https://registry.npmjs.org/underscore/-/underscore-1.9.1.tgz">https://registry.npmjs.org/underscore/-/underscore-1.9.1.tgz</a></p> <p>Path to dependency file: /fs-agent/test_input/ksa/ksa-web-root/ksa-web/src/main/webapp/rs/bootstrap/package.json</p> <p>Path to vulnerable library: fs-agent/test_input/ksa/ksa-web-root/ksa-web/src/main/webapp/rs/bootstrap/node_modules/underscore/package.json</p> <p> Dependency Hierarchy: - recess-1.0.3.tgz (Root Library) - :x: **underscore-1.9.1.tgz** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The package underscore from 1.13.0-0 and before 1.13.0-2, from 1.3.2 and before 1.12.1 are vulnerable to Arbitrary Code Execution via the template function, particularly when a variable property is passed as an argument as it is not sanitized. <p>Publish Date: 2021-03-29 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23358>CVE-2021-23358</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23358">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23358</a></p> <p>Release Date: 2021-03-29</p> <p>Fix Resolution: underscore - 1.12.1,1.13.0-2</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"underscore","packageVersion":"1.9.1","packageFilePaths":["/fs-agent/test_input/ksa/ksa-web-root/ksa-web/src/main/webapp/rs/bootstrap/package.json"],"isTransitiveDependency":true,"dependencyTree":"recess:1.0.3;underscore:1.9.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"underscore - 1.12.1,1.13.0-2"}],"baseBranches":[],"vulnerabilityIdentifier":"CVE-2021-23358","vulnerabilityDetails":"The package underscore from 1.13.0-0 and before 1.13.0-2, from 1.3.2 and before 1.12.1 are vulnerable to Arbitrary Code Execution via the template function, particularly when a variable property is passed as an argument as it is not sanitized.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23358","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
non_priority
cve high detected in underscore tgz cve high severity vulnerability vulnerable library underscore tgz javascript s functional programming helper library library home page a href path to dependency file fs agent test input ksa ksa web root ksa web src main webapp rs bootstrap package json path to vulnerable library fs agent test input ksa ksa web root ksa web src main webapp rs bootstrap node modules underscore package json dependency hierarchy recess tgz root library x underscore tgz vulnerable library vulnerability details the package underscore from and before from and before are vulnerable to arbitrary code execution via the template function particularly when a variable property is passed as an argument as it is not sanitized publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution underscore isopenpronvulnerability false ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree recess underscore isminimumfixversionavailable true minimumfixversion underscore basebranches vulnerabilityidentifier cve vulnerabilitydetails the package underscore from and before from and before are vulnerable to arbitrary code execution via the template function particularly when a variable property is passed as an argument as it is not sanitized vulnerabilityurl
0
1,720
3,353,328,447
IssuesEvent
2015-11-18 04:53:13
elmsln/elmsln
https://api.github.com/repos/elmsln/elmsln
closed
rm-site.sh changes
drush related enhancement infrastructure
- [x] backup site db w/ drush before killing - [x] back up config before killing - [ ] try to auto target and remove the lines from the sites.php file - [ ] remove all the confirmation and make it initial confirms, this was built by a sys admin so it asks too many questions that would need to be understood to keep a human employed.
1.0
rm-site.sh changes - - [x] backup site db w/ drush before killing - [x] back up config before killing - [ ] try to auto target and remove the lines from the sites.php file - [ ] remove all the confirmation and make it initial confirms, this was built by a sys admin so it asks too many questions that would need to be understood to keep a human employed.
non_priority
rm site sh changes backup site db w drush before killing back up config before killing try to auto target and remove the lines from the sites php file remove all the confirmation and make it initial confirms this was built by a sys admin so it asks too many questions that would need to be understood to keep a human employed
0
109,456
16,845,821,053
IssuesEvent
2021-06-19 13:09:01
mukul-seagate11/cortx-s3server
https://api.github.com/repos/mukul-seagate11/cortx-s3server
closed
CVE-2018-19362 (High) detected in jackson-databind-2.6.6.jar
security vulnerability
## CVE-2018-19362 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.6.6.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: cortx-s3server/auth-utils/jclient/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.6.6/jackson-databind-2.6.6.jar</p> <p> Dependency Hierarchy: - aws-java-sdk-s3-1.11.37.jar (Root Library) - aws-java-sdk-core-1.11.37.jar - :x: **jackson-databind-2.6.6.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://api.github.com/repos/mukul-seagate11/cortx-s3server/commits/03f1533c44ecd1d636be384cd5d10a8eb1e25f47">03f1533c44ecd1d636be384cd5d10a8eb1e25f47</a></p> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the jboss-common-core class from polymorphic deserialization. <p>Publish Date: 2019-01-02 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-19362>CVE-2018-19362</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19362">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19362</a></p> <p>Release Date: 2019-01-02</p> <p>Fix Resolution: 2.9.8</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2018-19362 (High) detected in jackson-databind-2.6.6.jar - ## CVE-2018-19362 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.6.6.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: cortx-s3server/auth-utils/jclient/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.6.6/jackson-databind-2.6.6.jar</p> <p> Dependency Hierarchy: - aws-java-sdk-s3-1.11.37.jar (Root Library) - aws-java-sdk-core-1.11.37.jar - :x: **jackson-databind-2.6.6.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://api.github.com/repos/mukul-seagate11/cortx-s3server/commits/03f1533c44ecd1d636be384cd5d10a8eb1e25f47">03f1533c44ecd1d636be384cd5d10a8eb1e25f47</a></p> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the jboss-common-core class from polymorphic deserialization. <p>Publish Date: 2019-01-02 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-19362>CVE-2018-19362</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19362">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19362</a></p> <p>Release Date: 2019-01-02</p> <p>Fix Resolution: 2.9.8</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in jackson databind jar cve high severity vulnerability vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file cortx auth utils jclient pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy aws java sdk jar root library aws java sdk core jar x jackson databind jar vulnerable library found in head commit a href found in base branch main vulnerability details fasterxml jackson databind x before might allow attackers to have unspecified impact by leveraging failure to block the jboss common core class from polymorphic deserialization publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
143,987
11,590,404,994
IssuesEvent
2020-02-24 06:36:49
escobard/create-app
https://api.github.com/repos/escobard/create-app
closed
UI - Note tests
Refactor UI Unit Tests enhancement
Part of the #39 1. Note CSS cleanup. 1. No Note logic & generic error logic setup. 1. No note and generic error catalog. 1. Note PropTypes. 1. Note unit tests.
1.0
UI - Note tests - Part of the #39 1. Note CSS cleanup. 1. No Note logic & generic error logic setup. 1. No note and generic error catalog. 1. Note PropTypes. 1. Note unit tests.
non_priority
ui note tests part of the note css cleanup no note logic generic error logic setup no note and generic error catalog note proptypes note unit tests
0
148,990
23,410,973,219
IssuesEvent
2022-08-12 17:28:54
piro17-Archive/FilmArchive
https://api.github.com/repos/piro17-Archive/FilmArchive
closed
[design] main 페이지
도윤 예진 design
### 목적 > main 페이지 디자인하기 ### 작업 상세 내용 - [x] 4페이지 swiper 적용 - [x] swiper autoplay 적용 - [x] 1, 2, 3등 프레임, 포즈/컨셉 순위 - [x] 네 컷 아카이브 설명 - [x] My 네 컷 앨범 자세히 - [x] My 네 컷 앨범 캘린더 - [x] 인생네컷 공유 프레임 자세히 - [x] 포즈 및 컨셉 추천 자세히 - [x] 한정판 프레임 자세히 ### 유의사항 1,2,3등 기능이 완성되면 css 적용할 것
1.0
[design] main 페이지 - ### 목적 > main 페이지 디자인하기 ### 작업 상세 내용 - [x] 4페이지 swiper 적용 - [x] swiper autoplay 적용 - [x] 1, 2, 3등 프레임, 포즈/컨셉 순위 - [x] 네 컷 아카이브 설명 - [x] My 네 컷 앨범 자세히 - [x] My 네 컷 앨범 캘린더 - [x] 인생네컷 공유 프레임 자세히 - [x] 포즈 및 컨셉 추천 자세히 - [x] 한정판 프레임 자세히 ### 유의사항 1,2,3등 기능이 완성되면 css 적용할 것
non_priority
main 페이지 목적 main 페이지 디자인하기 작업 상세 내용 swiper 적용 swiper autoplay 적용 프레임 포즈 컨셉 순위 네 컷 아카이브 설명 my 네 컷 앨범 자세히 my 네 컷 앨범 캘린더 인생네컷 공유 프레임 자세히 포즈 및 컨셉 추천 자세히 한정판 프레임 자세히 유의사항 기능이 완성되면 css 적용할 것
0
49,345
13,186,625,418
IssuesEvent
2020-08-13 00:47:21
icecube-trac/tix3
https://api.github.com/repos/icecube-trac/tix3
opened
[clast] TODOs (Trac #1207)
Incomplete Migration Migrated from Trac combo reconstruction defect
<details> <summary><em>Migrated from <a href="https://code.icecube.wisc.edu/ticket/1207">https://code.icecube.wisc.edu/ticket/1207</a>, reported by david.schultz and owned by markw04</em></summary> <p> ```json { "status": "closed", "changetime": "2019-02-13T14:14:55", "description": "Looks like there is more to be said. Let's fill that in or make some tickets.\n\n{{{\npublic/clast/I3CLastModule.h: * @todo There is probably more to be said here as David B. would put it.\npublic/clast/I3CLastCalculator.h: * @todo There is probably more to be said here as David B. would put it.\n}}}", "reporter": "david.schultz", "cc": "", "resolution": "fixed", "_ts": "1550067295757382", "component": "combo reconstruction", "summary": "[clast] TODOs", "priority": "critical", "keywords": "", "time": "2015-08-19T19:25:33", "milestone": "", "owner": "markw04", "type": "defect" } ``` </p> </details>
1.0
[clast] TODOs (Trac #1207) - <details> <summary><em>Migrated from <a href="https://code.icecube.wisc.edu/ticket/1207">https://code.icecube.wisc.edu/ticket/1207</a>, reported by david.schultz and owned by markw04</em></summary> <p> ```json { "status": "closed", "changetime": "2019-02-13T14:14:55", "description": "Looks like there is more to be said. Let's fill that in or make some tickets.\n\n{{{\npublic/clast/I3CLastModule.h: * @todo There is probably more to be said here as David B. would put it.\npublic/clast/I3CLastCalculator.h: * @todo There is probably more to be said here as David B. would put it.\n}}}", "reporter": "david.schultz", "cc": "", "resolution": "fixed", "_ts": "1550067295757382", "component": "combo reconstruction", "summary": "[clast] TODOs", "priority": "critical", "keywords": "", "time": "2015-08-19T19:25:33", "milestone": "", "owner": "markw04", "type": "defect" } ``` </p> </details>
non_priority
todos trac migrated from json status closed changetime description looks like there is more to be said let s fill that in or make some tickets n n npublic clast h todo there is probably more to be said here as david b would put it npublic clast h todo there is probably more to be said here as david b would put it n reporter david schultz cc resolution fixed ts component combo reconstruction summary todos priority critical keywords time milestone owner type defect
0
290,632
25,081,591,425
IssuesEvent
2022-11-07 19:49:39
hashicorp/terraform-provider-google
https://api.github.com/repos/hashicorp/terraform-provider-google
closed
Failing test(s): TestAccComputeDisk_imageDiffSuppressPublicVendorsFamilyNames
size/xs test failure crosslinked
<!--- This is a template for reporting test failures on nightly builds. It should only be used by core contributors who have access to our CI/CD results. ---> <!-- i.e. "Consistently since X date" or "X% failure in MONTH" --> Failure rate: 100% since 2022-10-23 <!-- List all impacted tests for searchability. The title of the issue can instead list one or more groups of tests, or describe the overall root cause. --> Impacted tests: - TestAccComputeDisk_imageDiffSuppressPublicVendorsFamilyNames <!-- Link to the nightly build(s), ideally with one impacted test opened --> Nightly builds: - https://ci-oss.hashicorp.engineering/buildConfiguration/GoogleCloud_ProviderGoogleCloudGoogleProject/348525?buildTab=tests&expandedTest=-7980878948564565037 <!-- The error message that displays in the tests tab, for reference --> Message: ``` resource_compute_disk_test.go:283: should suppress diff for image "https://www.googleapis.com/compute/v1/projects/ubuntu-os-cloud/global/images/ubuntu-2210-kinetic-amd64-v20221022" and family "ubuntu-2210-amd64" resource_compute_disk_test.go:283: should suppress diff for image "https://www.googleapis.com/compute/v1/projects/ubuntu-os-cloud/global/images/ubuntu-minimal-2210-kinetic-amd64-v20221022" and family "ubuntu-minimal-2210-amd64" ``` Same background as https://github.com/hashicorp/terraform-provider-google/issues/12143 b/256213974
1.0
Failing test(s): TestAccComputeDisk_imageDiffSuppressPublicVendorsFamilyNames - <!--- This is a template for reporting test failures on nightly builds. It should only be used by core contributors who have access to our CI/CD results. ---> <!-- i.e. "Consistently since X date" or "X% failure in MONTH" --> Failure rate: 100% since 2022-10-23 <!-- List all impacted tests for searchability. The title of the issue can instead list one or more groups of tests, or describe the overall root cause. --> Impacted tests: - TestAccComputeDisk_imageDiffSuppressPublicVendorsFamilyNames <!-- Link to the nightly build(s), ideally with one impacted test opened --> Nightly builds: - https://ci-oss.hashicorp.engineering/buildConfiguration/GoogleCloud_ProviderGoogleCloudGoogleProject/348525?buildTab=tests&expandedTest=-7980878948564565037 <!-- The error message that displays in the tests tab, for reference --> Message: ``` resource_compute_disk_test.go:283: should suppress diff for image "https://www.googleapis.com/compute/v1/projects/ubuntu-os-cloud/global/images/ubuntu-2210-kinetic-amd64-v20221022" and family "ubuntu-2210-amd64" resource_compute_disk_test.go:283: should suppress diff for image "https://www.googleapis.com/compute/v1/projects/ubuntu-os-cloud/global/images/ubuntu-minimal-2210-kinetic-amd64-v20221022" and family "ubuntu-minimal-2210-amd64" ``` Same background as https://github.com/hashicorp/terraform-provider-google/issues/12143 b/256213974
non_priority
failing test s testacccomputedisk imagediffsuppresspublicvendorsfamilynames failure rate since impacted tests testacccomputedisk imagediffsuppresspublicvendorsfamilynames nightly builds message resource compute disk test go should suppress diff for image and family ubuntu resource compute disk test go should suppress diff for image and family ubuntu minimal same background as b
0
59,956
14,514,644,909
IssuesEvent
2020-12-13 09:13:59
TalErez86/Test-Repository123
https://api.github.com/repos/TalErez86/Test-Repository123
opened
CVE-2020-17521 (Medium) detected in groovy-3.0.0.jar
security vulnerability
## CVE-2020-17521 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>groovy-3.0.0.jar</b></p></summary> <p>Groovy: A powerful, dynamic language for the JVM</p> <p>Library home page: <a href="https://groovy-lang.org">https://groovy-lang.org</a></p> <p>Path to dependency file: Test-Repository123/multi-module-maven-project-master/register-service/pom.xml</p> <p>Path to vulnerable library: canner/.m2/repository/org/codehaus/groovy/groovy/3.0.0/groovy-3.0.0.jar</p> <p> Dependency Hierarchy: - :x: **groovy-3.0.0.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/TalErez86/Test-Repository123/commit/4e4afbf004b9fd8ee375cc5c910630e64cb30a8e">4e4afbf004b9fd8ee375cc5c910630e64cb30a8e</a></p> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Apache Groovy provides extension methods to aid with creating temporary directories. Prior to this fix, Groovy's implementation of those extension methods was using a now superseded Java JDK method call that is potentially not secure on some operating systems in some contexts. Users not using the extension methods mentioned in the advisory are not affected, but may wish to read the advisory for further details. Versions Affected: 2.0 to 2.4.20, 2.5.0 to 2.5.13, 3.0.0 to 3.0.6, and 4.0.0-alpha-1. Fixed in versions 2.4.21, 2.5.14, 3.0.7, 4.0.0-alpha-2. <p>Publish Date: 2020-12-07 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-17521>CVE-2020-17521</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://issues.apache.org/jira/browse/GROOVY-9824">https://issues.apache.org/jira/browse/GROOVY-9824</a></p> <p>Release Date: 2020-12-07</p> <p>Fix Resolution: org.codehaus.groovy:groovy-all:2.4.21,2.5.14,3.0.7</p> </p> </details> <p></p> *** <!-- REMEDIATE-OPEN-PR-START --> - [ ] Check this box to open an automated fix PR <!-- REMEDIATE-OPEN-PR-END --> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"org.codehaus.groovy","packageName":"groovy","packageVersion":"3.0.0","isTransitiveDependency":false,"dependencyTree":"org.codehaus.groovy:groovy:3.0.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"org.codehaus.groovy:groovy-all:2.4.21,2.5.14,3.0.7"}],"vulnerabilityIdentifier":"CVE-2020-17521","vulnerabilityDetails":"Apache Groovy provides extension methods to aid with creating temporary directories. Prior to this fix, Groovy\u0027s implementation of those extension methods was using a now superseded Java JDK method call that is potentially not secure on some operating systems in some contexts. Users not using the extension methods mentioned in the advisory are not affected, but may wish to read the advisory for further details. Versions Affected: 2.0 to 2.4.20, 2.5.0 to 2.5.13, 3.0.0 to 3.0.6, and 4.0.0-alpha-1. Fixed in versions 2.4.21, 2.5.14, 3.0.7, 4.0.0-alpha-2.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-17521","cvss3Severity":"medium","cvss3Score":"5.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"Low","S":"Unchanged","C":"High","UI":"None","AV":"Local","I":"None"},"extraData":{}}</REMEDIATE> -->
True
CVE-2020-17521 (Medium) detected in groovy-3.0.0.jar - ## CVE-2020-17521 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>groovy-3.0.0.jar</b></p></summary> <p>Groovy: A powerful, dynamic language for the JVM</p> <p>Library home page: <a href="https://groovy-lang.org">https://groovy-lang.org</a></p> <p>Path to dependency file: Test-Repository123/multi-module-maven-project-master/register-service/pom.xml</p> <p>Path to vulnerable library: canner/.m2/repository/org/codehaus/groovy/groovy/3.0.0/groovy-3.0.0.jar</p> <p> Dependency Hierarchy: - :x: **groovy-3.0.0.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/TalErez86/Test-Repository123/commit/4e4afbf004b9fd8ee375cc5c910630e64cb30a8e">4e4afbf004b9fd8ee375cc5c910630e64cb30a8e</a></p> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Apache Groovy provides extension methods to aid with creating temporary directories. Prior to this fix, Groovy's implementation of those extension methods was using a now superseded Java JDK method call that is potentially not secure on some operating systems in some contexts. Users not using the extension methods mentioned in the advisory are not affected, but may wish to read the advisory for further details. Versions Affected: 2.0 to 2.4.20, 2.5.0 to 2.5.13, 3.0.0 to 3.0.6, and 4.0.0-alpha-1. Fixed in versions 2.4.21, 2.5.14, 3.0.7, 4.0.0-alpha-2. <p>Publish Date: 2020-12-07 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-17521>CVE-2020-17521</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://issues.apache.org/jira/browse/GROOVY-9824">https://issues.apache.org/jira/browse/GROOVY-9824</a></p> <p>Release Date: 2020-12-07</p> <p>Fix Resolution: org.codehaus.groovy:groovy-all:2.4.21,2.5.14,3.0.7</p> </p> </details> <p></p> *** <!-- REMEDIATE-OPEN-PR-START --> - [ ] Check this box to open an automated fix PR <!-- REMEDIATE-OPEN-PR-END --> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"org.codehaus.groovy","packageName":"groovy","packageVersion":"3.0.0","isTransitiveDependency":false,"dependencyTree":"org.codehaus.groovy:groovy:3.0.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"org.codehaus.groovy:groovy-all:2.4.21,2.5.14,3.0.7"}],"vulnerabilityIdentifier":"CVE-2020-17521","vulnerabilityDetails":"Apache Groovy provides extension methods to aid with creating temporary directories. Prior to this fix, Groovy\u0027s implementation of those extension methods was using a now superseded Java JDK method call that is potentially not secure on some operating systems in some contexts. Users not using the extension methods mentioned in the advisory are not affected, but may wish to read the advisory for further details. Versions Affected: 2.0 to 2.4.20, 2.5.0 to 2.5.13, 3.0.0 to 3.0.6, and 4.0.0-alpha-1. Fixed in versions 2.4.21, 2.5.14, 3.0.7, 4.0.0-alpha-2.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-17521","cvss3Severity":"medium","cvss3Score":"5.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"Low","S":"Unchanged","C":"High","UI":"None","AV":"Local","I":"None"},"extraData":{}}</REMEDIATE> -->
non_priority
cve medium detected in groovy jar cve medium severity vulnerability vulnerable library groovy jar groovy a powerful dynamic language for the jvm library home page a href path to dependency file test multi module maven project master register service pom xml path to vulnerable library canner repository org codehaus groovy groovy groovy jar dependency hierarchy x groovy jar vulnerable library found in head commit a href found in base branch main vulnerability details apache groovy provides extension methods to aid with creating temporary directories prior to this fix groovy s implementation of those extension methods was using a now superseded java jdk method call that is potentially not secure on some operating systems in some contexts users not using the extension methods mentioned in the advisory are not affected but may wish to read the advisory for further details versions affected to to to and alpha fixed in versions alpha publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org codehaus groovy groovy all check this box to open an automated fix pr isopenpronvulnerability false ispackagebased true isdefaultbranch true packages vulnerabilityidentifier cve vulnerabilitydetails apache groovy provides extension methods to aid with creating temporary directories prior to this fix groovy implementation of those extension methods was using a now superseded java jdk method call that is potentially not secure on some operating systems in some contexts users not using the extension methods mentioned in the advisory are not affected but may wish to read the advisory for further details versions affected to to to and alpha fixed in versions alpha vulnerabilityurl
0
7,290
5,962,202,896
IssuesEvent
2017-05-29 21:00:16
JuliaLang/julia
https://api.github.com/repos/JuliaLang/julia
closed
spzeros and speye are really slow
performance sparse
I searched and couldn't find any open issue on this, which surprised me. Not too sure what the problem is with the code in Base, but if I write my own `spzeros`, it is much faster (the same thing happens with `speye`): ```julia julia> using BenchmarkTools julia> @benchmark spzeros(5,5) BenchmarkTools.Trial: memory estimate: 1.11 KiB allocs estimate: 18 -------------- minimum time: 9.330 μs (0.00% GC) median time: 9.953 μs (0.00% GC) mean time: 10.215 μs (0.00% GC) maximum time: 60.647 μs (0.00% GC) -------------- samples: 10000 evals/sample: 1 julia> function my_spzeros(m,n) ((m < 0) || (n < 0)) && throw(ArgumentError("invalid Array dimensions")) rowval = Vector{Int}(0) colptr = ones(Int,n+1) nzval = Vector{Float64}(0) return SparseMatrixCSC(m,n,colptr,rowval,nzval) end my_spzeros (generic function with 1 method) julia> @benchmark my_spzeros(5,5) BenchmarkTools.Trial: memory estimate: 336 bytes allocs estimate: 4 -------------- minimum time: 88.951 ns (0.00% GC) median time: 97.654 ns (0.00% GC) mean time: 117.422 ns (13.87% GC) maximum time: 1.565 μs (0.00% GC) -------------- samples: 10000 evals/sample: 965 ```
True
spzeros and speye are really slow - I searched and couldn't find any open issue on this, which surprised me. Not too sure what the problem is with the code in Base, but if I write my own `spzeros`, it is much faster (the same thing happens with `speye`): ```julia julia> using BenchmarkTools julia> @benchmark spzeros(5,5) BenchmarkTools.Trial: memory estimate: 1.11 KiB allocs estimate: 18 -------------- minimum time: 9.330 μs (0.00% GC) median time: 9.953 μs (0.00% GC) mean time: 10.215 μs (0.00% GC) maximum time: 60.647 μs (0.00% GC) -------------- samples: 10000 evals/sample: 1 julia> function my_spzeros(m,n) ((m < 0) || (n < 0)) && throw(ArgumentError("invalid Array dimensions")) rowval = Vector{Int}(0) colptr = ones(Int,n+1) nzval = Vector{Float64}(0) return SparseMatrixCSC(m,n,colptr,rowval,nzval) end my_spzeros (generic function with 1 method) julia> @benchmark my_spzeros(5,5) BenchmarkTools.Trial: memory estimate: 336 bytes allocs estimate: 4 -------------- minimum time: 88.951 ns (0.00% GC) median time: 97.654 ns (0.00% GC) mean time: 117.422 ns (13.87% GC) maximum time: 1.565 μs (0.00% GC) -------------- samples: 10000 evals/sample: 965 ```
non_priority
spzeros and speye are really slow i searched and couldn t find any open issue on this which surprised me not too sure what the problem is with the code in base but if i write my own spzeros it is much faster the same thing happens with speye julia julia using benchmarktools julia benchmark spzeros benchmarktools trial memory estimate kib allocs estimate minimum time μs gc median time μs gc mean time μs gc maximum time μs gc samples evals sample julia function my spzeros m n m n throw argumenterror invalid array dimensions rowval vector int colptr ones int n nzval vector return sparsematrixcsc m n colptr rowval nzval end my spzeros generic function with method julia benchmark my spzeros benchmarktools trial memory estimate bytes allocs estimate minimum time ns gc median time ns gc mean time ns gc maximum time μs gc samples evals sample
0
35,918
7,834,258,272
IssuesEvent
2018-06-16 11:16:50
StrikeNP/trac_test
https://api.github.com/repos/StrikeNP/trac_test
closed
Determine SILHS sampling level based on within-cloud rcm (Trac #758)
Migrated from Trac clubb_src defect raut@uwm.edu
**Introduction** In https://github.com/larson-group/clubb/issues/752, we saw that calculating `k_lh_start` as `rcm / cloud_frac` improved results. **Technical spec** In this ticket, let's test and commit that change. **Test** Post plots. Output should bin-diff identical for non-SILHS cases. Attachments: [r7424_k_lh_rcm_in_cloud.diff](https://github.com/larson-group/trac_attachment_archive/blob/master/clubb/r7424_k_lh_rcm_in_cloud.diff) [r7424_k_lh_rcm_in_cloud.maff](https://github.com/larson-group/trac_attachment_archive/blob/master/clubb/r7424_k_lh_rcm_in_cloud.maff) [r7424_k_lh_rcm_in_cloud_prescribed_probs.diff](https://github.com/larson-group/trac_attachment_archive/blob/master/clubb/r7424_k_lh_rcm_in_cloud_prescribed_probs.diff) [r7424_k_lh_rcm_in_cloud_prescribed_probs.maff](https://github.com/larson-group/trac_attachment_archive/blob/master/clubb/r7424_k_lh_rcm_in_cloud_prescribed_probs.maff) [r7424_k_lh_cld_presc_seed_2048.diff](https://github.com/larson-group/trac_attachment_archive/blob/master/clubb/r7424_k_lh_cld_presc_seed_2048.diff) [r7424_k_lh_cld_presc_seed_2048.maff](https://github.com/larson-group/trac_attachment_archive/blob/master/clubb/r7424_k_lh_cld_presc_seed_2048.maff) [k_lh_start_old_vs_new.svg](https://github.com/larson-group/trac_attachment_archive/blob/master/clubb/k_lh_start_old_vs_new.svg) [rico_lh_comparison_test.maff](https://github.com/larson-group/trac_attachment_archive/blob/master/clubb/rico_lh_comparison_test.maff) [rico_lh_comp_1000.maff](https://github.com/larson-group/trac_attachment_archive/blob/master/clubb/rico_lh_comp_1000.maff) [rico_lh_comp_1000_whole_time_avg.maff](https://github.com/larson-group/trac_attachment_archive/blob/master/clubb/rico_lh_comp_1000_whole_time_avg.maff) [rico_lh_comp_1000_s50.maff](https://github.com/larson-group/trac_attachment_archive/blob/master/clubb/rico_lh_comp_1000_s50.maff) [rico_lh_1000_maxoverlap.maff](https://github.com/larson-group/trac_attachment_archive/blob/master/clubb/rico_lh_1000_maxoverlap.maff) Migrated from http://carson.math.uwm.edu/trac/clubb/ticket/758 ```json { "status": "closed", "changetime": "2015-06-16T20:14:49", "description": "'''Introduction'''\n\nIn comment:14:ticket:752, we saw that calculating `k_lh_start` as `rcm / cloud_frac` improved results.\n\n'''Technical spec'''\n\nIn this ticket, let's test and commit that change.\n\n'''Test'''\n\nPost plots.\n\nOutput should bin-diff identical for non-SILHS cases.", "reporter": "raut@uwm.edu", "cc": "vlarson@uwm.edu", "resolution": "continued", "_ts": "1434485689429994", "component": "clubb_src", "summary": "Determine SILHS sampling level based on within-cloud rcm", "priority": "major", "keywords": "", "time": "2014-12-17T01:03:06", "milestone": "Improve SILHS", "owner": "raut@uwm.edu", "type": "defect" } ```
1.0
Determine SILHS sampling level based on within-cloud rcm (Trac #758) - **Introduction** In https://github.com/larson-group/clubb/issues/752, we saw that calculating `k_lh_start` as `rcm / cloud_frac` improved results. **Technical spec** In this ticket, let's test and commit that change. **Test** Post plots. Output should bin-diff identical for non-SILHS cases. Attachments: [r7424_k_lh_rcm_in_cloud.diff](https://github.com/larson-group/trac_attachment_archive/blob/master/clubb/r7424_k_lh_rcm_in_cloud.diff) [r7424_k_lh_rcm_in_cloud.maff](https://github.com/larson-group/trac_attachment_archive/blob/master/clubb/r7424_k_lh_rcm_in_cloud.maff) [r7424_k_lh_rcm_in_cloud_prescribed_probs.diff](https://github.com/larson-group/trac_attachment_archive/blob/master/clubb/r7424_k_lh_rcm_in_cloud_prescribed_probs.diff) [r7424_k_lh_rcm_in_cloud_prescribed_probs.maff](https://github.com/larson-group/trac_attachment_archive/blob/master/clubb/r7424_k_lh_rcm_in_cloud_prescribed_probs.maff) [r7424_k_lh_cld_presc_seed_2048.diff](https://github.com/larson-group/trac_attachment_archive/blob/master/clubb/r7424_k_lh_cld_presc_seed_2048.diff) [r7424_k_lh_cld_presc_seed_2048.maff](https://github.com/larson-group/trac_attachment_archive/blob/master/clubb/r7424_k_lh_cld_presc_seed_2048.maff) [k_lh_start_old_vs_new.svg](https://github.com/larson-group/trac_attachment_archive/blob/master/clubb/k_lh_start_old_vs_new.svg) [rico_lh_comparison_test.maff](https://github.com/larson-group/trac_attachment_archive/blob/master/clubb/rico_lh_comparison_test.maff) [rico_lh_comp_1000.maff](https://github.com/larson-group/trac_attachment_archive/blob/master/clubb/rico_lh_comp_1000.maff) [rico_lh_comp_1000_whole_time_avg.maff](https://github.com/larson-group/trac_attachment_archive/blob/master/clubb/rico_lh_comp_1000_whole_time_avg.maff) [rico_lh_comp_1000_s50.maff](https://github.com/larson-group/trac_attachment_archive/blob/master/clubb/rico_lh_comp_1000_s50.maff) [rico_lh_1000_maxoverlap.maff](https://github.com/larson-group/trac_attachment_archive/blob/master/clubb/rico_lh_1000_maxoverlap.maff) Migrated from http://carson.math.uwm.edu/trac/clubb/ticket/758 ```json { "status": "closed", "changetime": "2015-06-16T20:14:49", "description": "'''Introduction'''\n\nIn comment:14:ticket:752, we saw that calculating `k_lh_start` as `rcm / cloud_frac` improved results.\n\n'''Technical spec'''\n\nIn this ticket, let's test and commit that change.\n\n'''Test'''\n\nPost plots.\n\nOutput should bin-diff identical for non-SILHS cases.", "reporter": "raut@uwm.edu", "cc": "vlarson@uwm.edu", "resolution": "continued", "_ts": "1434485689429994", "component": "clubb_src", "summary": "Determine SILHS sampling level based on within-cloud rcm", "priority": "major", "keywords": "", "time": "2014-12-17T01:03:06", "milestone": "Improve SILHS", "owner": "raut@uwm.edu", "type": "defect" } ```
non_priority
determine silhs sampling level based on within cloud rcm trac introduction in we saw that calculating k lh start as rcm cloud frac improved results technical spec in this ticket let s test and commit that change test post plots output should bin diff identical for non silhs cases attachments migrated from json status closed changetime description introduction n nin comment ticket we saw that calculating k lh start as rcm cloud frac improved results n n technical spec n nin this ticket let s test and commit that change n n test n npost plots n noutput should bin diff identical for non silhs cases reporter raut uwm edu cc vlarson uwm edu resolution continued ts component clubb src summary determine silhs sampling level based on within cloud rcm priority major keywords time milestone improve silhs owner raut uwm edu type defect
0
169,992
14,238,122,244
IssuesEvent
2020-11-18 18:09:51
agustinanisaf/SquareCheck-android
https://api.github.com/repos/agustinanisaf/SquareCheck-android
closed
Create Github Issue Template
documentation
What to do --- - [x] Create **New Feature** Issue Template - [x] Create **Bug Report** Issue Template References --- - [Github Docs](https://docs.github.com/en/free-pro-team@latest/github/building-a-strong-community/configuring-issue-templates-for-your-repository)
1.0
Create Github Issue Template - What to do --- - [x] Create **New Feature** Issue Template - [x] Create **Bug Report** Issue Template References --- - [Github Docs](https://docs.github.com/en/free-pro-team@latest/github/building-a-strong-community/configuring-issue-templates-for-your-repository)
non_priority
create github issue template what to do create new feature issue template create bug report issue template references
0
44,170
5,764,992,640
IssuesEvent
2017-04-27 00:23:59
quicwg/base-drafts
https://api.github.com/repos/quicwg/base-drafts
closed
Get rid of the concurrent stream limit by advertising a maximum stream ID
design transport
We've already had a lot of discussions about the concurrent streams limit, which all brought us back to the problem that at every given moment both peers have to agree about the number of open streams, which seems to require a non-trivial amount of bookkeeping (of ACKs received for all STREAM frames sent on a given stream). I'd like to propose a different solution, which solves this problem, and has a couple of nice additional properties as well: A receiver advertises the maximum Stream ID it is willing to accept. The sender is allowed to open all streams that have IDs not larger than this number. The receiver can advertise a higher maximum Stream ID whenever it likes to, by sending a STREAM_LIMIT_UPDATE frame. STREAM_LIMIT_UPDATE is a retransmittable frame that contains a single value, the maximum Stream ID. Note that conceptually, this is similar to advertising a flow control offset (and the rules for STREAM_LIMIT_UPDATEs would be similar to those for WINDOW_UPDATEs). An implementation is free to choose any algorithm to determine which maximum Stream ID it advertises. The number of open streams may be used, but I can think of a couple of other ways to limit the state a peer can create. It would even be possible to advertise different limits depending on the server load.
1.0
Get rid of the concurrent stream limit by advertising a maximum stream ID - We've already had a lot of discussions about the concurrent streams limit, which all brought us back to the problem that at every given moment both peers have to agree about the number of open streams, which seems to require a non-trivial amount of bookkeeping (of ACKs received for all STREAM frames sent on a given stream). I'd like to propose a different solution, which solves this problem, and has a couple of nice additional properties as well: A receiver advertises the maximum Stream ID it is willing to accept. The sender is allowed to open all streams that have IDs not larger than this number. The receiver can advertise a higher maximum Stream ID whenever it likes to, by sending a STREAM_LIMIT_UPDATE frame. STREAM_LIMIT_UPDATE is a retransmittable frame that contains a single value, the maximum Stream ID. Note that conceptually, this is similar to advertising a flow control offset (and the rules for STREAM_LIMIT_UPDATEs would be similar to those for WINDOW_UPDATEs). An implementation is free to choose any algorithm to determine which maximum Stream ID it advertises. The number of open streams may be used, but I can think of a couple of other ways to limit the state a peer can create. It would even be possible to advertise different limits depending on the server load.
non_priority
get rid of the concurrent stream limit by advertising a maximum stream id we ve already had a lot of discussions about the concurrent streams limit which all brought us back to the problem that at every given moment both peers have to agree about the number of open streams which seems to require a non trivial amount of bookkeeping of acks received for all stream frames sent on a given stream i d like to propose a different solution which solves this problem and has a couple of nice additional properties as well a receiver advertises the maximum stream id it is willing to accept the sender is allowed to open all streams that have ids not larger than this number the receiver can advertise a higher maximum stream id whenever it likes to by sending a stream limit update frame stream limit update is a retransmittable frame that contains a single value the maximum stream id note that conceptually this is similar to advertising a flow control offset and the rules for stream limit updates would be similar to those for window updates an implementation is free to choose any algorithm to determine which maximum stream id it advertises the number of open streams may be used but i can think of a couple of other ways to limit the state a peer can create it would even be possible to advertise different limits depending on the server load
0
256,329
27,561,650,831
IssuesEvent
2023-03-07 22:37:53
samqws-marketing/nutanix_Nutanix-Calm-Jenkins-Plugin
https://api.github.com/repos/samqws-marketing/nutanix_Nutanix-Calm-Jenkins-Plugin
closed
CVE-2021-4104 (High) detected in log4j-1.2.17.jar - autoclosed
security vulnerability
## CVE-2021-4104 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>log4j-1.2.17.jar</b></p></summary> <p>Apache Log4j 1.2</p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/log4j/log4j/1.2.17/log4j-1.2.17.jar</p> <p> Dependency Hierarchy: - jsse-2.0.5.jar (Root Library) - ssl-proxies-2.0.5.jar - :x: **log4j-1.2.17.jar** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration. The attacker can provide TopicBindingName and TopicConnectionFactoryBindingName configurations causing JMSAppender to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-44228. Note this issue only affects Log4j 1.2 when specifically configured to use JMSAppender, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions. <p>Publish Date: 2021-12-14 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-4104>CVE-2021-4104</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4104">https://nvd.nist.gov/vuln/detail/CVE-2021-4104</a></p> <p>Release Date: 2021-12-14</p> <p>Fix Resolution: uom-parent - 1.0.3-3.module,1.0.3-3.module;uom-se-javadoc - 1.0.4-3.module;parfait-examples - 0.5.4-4.module;log4j-manual - 1.2.17-16;si-units-javadoc - 0.6.5-2.module;unit-api - 1.0-5.module,1.0-5.module;unit-api-javadoc - 1.0-5.module;parfait - 0.5.4-4.module,0.5.4-4.module;log4j-javadoc - 1.2.17-16;uom-systems-javadoc - 0.7-1.module;uom-lib-javadoc - 1.0.1-6.module;uom-systems - 0.7-1.module,0.7-1.module;log4j - 1.2.17-16,1.2.17-16;uom-se - 1.0.4-3.module,1.0.4-3.module;uom-lib - 1.0.1-6.module,1.0.1-6.module;parfait-javadoc - 0.5.4-4.module;pcp-parfait-agent - 0.5.4-4.module;si-units - 0.6.5-2.module,0.6.5-2.module</p> </p> </details> <p></p>
True
CVE-2021-4104 (High) detected in log4j-1.2.17.jar - autoclosed - ## CVE-2021-4104 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>log4j-1.2.17.jar</b></p></summary> <p>Apache Log4j 1.2</p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/log4j/log4j/1.2.17/log4j-1.2.17.jar</p> <p> Dependency Hierarchy: - jsse-2.0.5.jar (Root Library) - ssl-proxies-2.0.5.jar - :x: **log4j-1.2.17.jar** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration. The attacker can provide TopicBindingName and TopicConnectionFactoryBindingName configurations causing JMSAppender to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-44228. Note this issue only affects Log4j 1.2 when specifically configured to use JMSAppender, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions. <p>Publish Date: 2021-12-14 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-4104>CVE-2021-4104</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4104">https://nvd.nist.gov/vuln/detail/CVE-2021-4104</a></p> <p>Release Date: 2021-12-14</p> <p>Fix Resolution: uom-parent - 1.0.3-3.module,1.0.3-3.module;uom-se-javadoc - 1.0.4-3.module;parfait-examples - 0.5.4-4.module;log4j-manual - 1.2.17-16;si-units-javadoc - 0.6.5-2.module;unit-api - 1.0-5.module,1.0-5.module;unit-api-javadoc - 1.0-5.module;parfait - 0.5.4-4.module,0.5.4-4.module;log4j-javadoc - 1.2.17-16;uom-systems-javadoc - 0.7-1.module;uom-lib-javadoc - 1.0.1-6.module;uom-systems - 0.7-1.module,0.7-1.module;log4j - 1.2.17-16,1.2.17-16;uom-se - 1.0.4-3.module,1.0.4-3.module;uom-lib - 1.0.1-6.module,1.0.1-6.module;parfait-javadoc - 0.5.4-4.module;pcp-parfait-agent - 0.5.4-4.module;si-units - 0.6.5-2.module,0.6.5-2.module</p> </p> </details> <p></p>
non_priority
cve high detected in jar autoclosed cve high severity vulnerability vulnerable library jar apache path to dependency file pom xml path to vulnerable library home wss scanner repository jar dependency hierarchy jsse jar root library ssl proxies jar x jar vulnerable library found in base branch master vulnerability details jmsappender in is vulnerable to deserialization of untrusted data when the attacker has write access to the configuration the attacker can provide topicbindingname and topicconnectionfactorybindingname configurations causing jmsappender to perform jndi requests that result in remote code execution in a similar fashion to cve note this issue only affects when specifically configured to use jmsappender which is not the default apache reached end of life in august users should upgrade to as it addresses numerous other issues from the previous versions publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution uom parent module module uom se javadoc module parfait examples module manual si units javadoc module unit api module module unit api javadoc module parfait module module javadoc uom systems javadoc module uom lib javadoc module uom systems module module uom se module module uom lib module module parfait javadoc module pcp parfait agent module si units module module
0
111,710
9,539,544,545
IssuesEvent
2019-04-30 17:13:26
kcigeospatial/Fred_Co_Land-Management
https://api.github.com/repos/kcigeospatial/Fred_Co_Land-Management
closed
Planning-APFO-stuck in under review
Ready For Retest
stuck in under review. There is no review to review. ![image](https://user-images.githubusercontent.com/4129185/56971879-0b186700-6b38-11e9-990a-88060f423212.png) MW
1.0
Planning-APFO-stuck in under review - stuck in under review. There is no review to review. ![image](https://user-images.githubusercontent.com/4129185/56971879-0b186700-6b38-11e9-990a-88060f423212.png) MW
non_priority
planning apfo stuck in under review stuck in under review there is no review to review mw
0
179,240
30,204,769,581
IssuesEvent
2023-07-05 08:41:41
Tonomy-Foundation/Tonomy-ID-Management
https://api.github.com/repos/Tonomy-Foundation/Tonomy-ID-Management
opened
Design what happens if user uses bad password
design
Acceptance criteria - [ ] design view for if the user password has been used before Inspiration - https://haveibeenpwned.com/Passwords
1.0
Design what happens if user uses bad password - Acceptance criteria - [ ] design view for if the user password has been used before Inspiration - https://haveibeenpwned.com/Passwords
non_priority
design what happens if user uses bad password acceptance criteria design view for if the user password has been used before inspiration
0
46,098
13,150,337,597
IssuesEvent
2020-08-09 10:57:28
shaundmorris/ddf
https://api.github.com/repos/shaundmorris/ddf
closed
CVE-2018-11695 High Severity Vulnerability detected by WhiteSource
security vulnerability wontfix
## CVE-2018-11695 - High Severity Vulnerability <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>node-sassv4.9.4</b></p></summary> <p> <p>:rainbow: Node.js bindings to libsass</p> <p>Library home page: <a href=https://github.com/sass/node-sass.git>https://github.com/sass/node-sass.git</a></p> <p>Found in HEAD commit: <a href="https://github.com/shaundmorris/ddf/commit/ea35fc52f05b85ef437e9a9e39a887ad51692ff0">ea35fc52f05b85ef437e9a9e39a887ad51692ff0</a></p> </p> </details> </p></p> <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/vulnerability_details.png' width=19 height=20> Library Source Files (121)</summary> <p></p> <p> * The source files were matched to this source library based on a best effort match. Source libraries are selected from a list of probable public libraries.</p> <p> - /ddf/ui/node_modules/node-sass/src/libsass/src/error_handling.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/output.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/output.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/check_nesting.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/sass_values.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/check_nesting.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/bind.cpp - /ddf/ui/node_modules/node-sass/src/libsass/test/test_node.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/constants.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/eval.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/plugins.cpp - /ddf/ui/node_modules/node-sass/src/libsass/include/sass/base.h - /ddf/ui/node_modules/node-sass/src/libsass/src/prelexer.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/subset_map.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/extend.cpp - /ddf/ui/node_modules/node-sass/src/custom_importer_bridge.cpp - /ddf/ui/node_modules/node-sass/src/libsass/contrib/plugin.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/lexer.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/sass_util.cpp - /ddf/ui/node_modules/node-sass/src/libsass/test/test_superselector.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/cencode.c - /ddf/ui/node_modules/node-sass/src/libsass/src/ast_fwd_decl.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/utf8_string.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/file.cpp - /ddf/ui/node_modules/node-sass/src/callback_bridge.h - /ddf/ui/node_modules/node-sass/src/libsass/src/subset_map.cpp - /ddf/ui/node_modules/node-sass/src/libsass/include/sass2scss.h - /ddf/ui/node_modules/node-sass/src/libsass/src/sass_functions.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/emitter.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/environment.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/ast_def_macros.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/paths.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/expand.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/listize.cpp - /ddf/ui/node_modules/node-sass/src/libsass/test/test_unification.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/source_map.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/inspect.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/source_map.hpp - /ddf/ui/node_modules/node-sass/src/sass_types/list.h - /ddf/ui/node_modules/node-sass/src/libsass/src/sass_functions.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/json.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/sass_util.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/position.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/listize.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/error_handling.hpp - /ddf/ui/node_modules/node-sass/src/sass_types/string.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/eval.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/environment.hpp - /ddf/ui/node_modules/node-sass/src/sass_types/boolean.h - /ddf/ui/node_modules/node-sass/src/libsass/src/emitter.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/extend.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/lexer.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/functions.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/debugger.hpp - /ddf/ui/node_modules/node-sass/src/sass_types/factory.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/prelexer.cpp - /ddf/ui/node_modules/node-sass/src/sass_types/color.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/operation.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/ast.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/sass.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/constants.hpp - /ddf/ui/node_modules/node-sass/src/sass_types/boolean.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/context.hpp - /ddf/ui/node_modules/node-sass/src/sass_types/value.h - /ddf/ui/node_modules/node-sass/src/libsass/src/units.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/cssize.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/parser.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/functions.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/position.hpp - /ddf/ui/node_modules/node-sass/src/sass_context_wrapper.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/sass_context.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/node.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/ast_fwd_decl.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/cssize.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/remove_placeholders.cpp - /ddf/ui/node_modules/node-sass/src/binding.cpp - /ddf/ui/node_modules/node-sass/src/sass_types/list.cpp - /ddf/ui/node_modules/node-sass/src/libsass/include/sass/functions.h - /ddf/ui/node_modules/node-sass/src/custom_function_bridge.cpp - /ddf/ui/node_modules/node-sass/src/custom_importer_bridge.h - /ddf/ui/node_modules/node-sass/src/libsass/src/color_maps.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/utf8_string.cpp - /ddf/ui/node_modules/node-sass/src/sass_types/sass_value_wrapper.h - /ddf/ui/node_modules/node-sass/src/libsass/src/ast.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/values.cpp - /ddf/ui/node_modules/node-sass/src/sass_context_wrapper.h - /ddf/ui/node_modules/node-sass/src/libsass/src/b64/encode.h - /ddf/ui/node_modules/node-sass/src/libsass/src/sass.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/base64vlq.cpp - /ddf/ui/node_modules/node-sass/src/sass_types/number.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/c99func.c - /ddf/ui/node_modules/node-sass/src/libsass/src/node.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/remove_placeholders.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/util.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/memory/SharedPtr.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/backtrace.hpp - /ddf/ui/node_modules/node-sass/src/libsass/include/sass/values.h - /ddf/ui/node_modules/node-sass/src/libsass/test/test_subset_map.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/sass2scss.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/sass_context.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/memory/SharedPtr.cpp - /ddf/ui/node_modules/node-sass/src/sass_types/null.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/expand.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/to_value.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/context.cpp - /ddf/ui/node_modules/node-sass/src/libsass/include/sass/context.h - /ddf/ui/node_modules/node-sass/src/libsass/src/to_c.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/sass_values.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/color_maps.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/inspect.hpp - /ddf/ui/node_modules/node-sass/src/libsass/script/test-leaks.pl - /ddf/ui/node_modules/node-sass/src/libsass/src/to_c.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/util.hpp - /ddf/ui/node_modules/node-sass/src/sass_types/map.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/file.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/units.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/plugins.hpp - /ddf/ui/node_modules/node-sass/src/sass_types/color.h - /ddf/ui/node_modules/node-sass/src/libsass/src/to_value.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/debug.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/parser.hpp </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> An issue was discovered in LibSass through 3.5.2. A NULL pointer dereference was found in the function Sass::Expand::operator which could be leveraged by an attacker to cause a denial of service (application crash) or possibly have unspecified other impact. <p>Publish Date: 2018-06-04 <p>URL: <a href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11695>CVE-2018-11695</a></p> </p> </details> <p></p> <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2018-11695 High Severity Vulnerability detected by WhiteSource - ## CVE-2018-11695 - High Severity Vulnerability <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>node-sassv4.9.4</b></p></summary> <p> <p>:rainbow: Node.js bindings to libsass</p> <p>Library home page: <a href=https://github.com/sass/node-sass.git>https://github.com/sass/node-sass.git</a></p> <p>Found in HEAD commit: <a href="https://github.com/shaundmorris/ddf/commit/ea35fc52f05b85ef437e9a9e39a887ad51692ff0">ea35fc52f05b85ef437e9a9e39a887ad51692ff0</a></p> </p> </details> </p></p> <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/vulnerability_details.png' width=19 height=20> Library Source Files (121)</summary> <p></p> <p> * The source files were matched to this source library based on a best effort match. Source libraries are selected from a list of probable public libraries.</p> <p> - /ddf/ui/node_modules/node-sass/src/libsass/src/error_handling.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/output.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/output.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/check_nesting.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/sass_values.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/check_nesting.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/bind.cpp - /ddf/ui/node_modules/node-sass/src/libsass/test/test_node.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/constants.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/eval.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/plugins.cpp - /ddf/ui/node_modules/node-sass/src/libsass/include/sass/base.h - /ddf/ui/node_modules/node-sass/src/libsass/src/prelexer.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/subset_map.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/extend.cpp - /ddf/ui/node_modules/node-sass/src/custom_importer_bridge.cpp - /ddf/ui/node_modules/node-sass/src/libsass/contrib/plugin.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/lexer.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/sass_util.cpp - /ddf/ui/node_modules/node-sass/src/libsass/test/test_superselector.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/cencode.c - /ddf/ui/node_modules/node-sass/src/libsass/src/ast_fwd_decl.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/utf8_string.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/file.cpp - /ddf/ui/node_modules/node-sass/src/callback_bridge.h - /ddf/ui/node_modules/node-sass/src/libsass/src/subset_map.cpp - /ddf/ui/node_modules/node-sass/src/libsass/include/sass2scss.h - /ddf/ui/node_modules/node-sass/src/libsass/src/sass_functions.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/emitter.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/environment.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/ast_def_macros.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/paths.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/expand.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/listize.cpp - /ddf/ui/node_modules/node-sass/src/libsass/test/test_unification.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/source_map.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/inspect.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/source_map.hpp - /ddf/ui/node_modules/node-sass/src/sass_types/list.h - /ddf/ui/node_modules/node-sass/src/libsass/src/sass_functions.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/json.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/sass_util.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/position.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/listize.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/error_handling.hpp - /ddf/ui/node_modules/node-sass/src/sass_types/string.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/eval.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/environment.hpp - /ddf/ui/node_modules/node-sass/src/sass_types/boolean.h - /ddf/ui/node_modules/node-sass/src/libsass/src/emitter.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/extend.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/lexer.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/functions.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/debugger.hpp - /ddf/ui/node_modules/node-sass/src/sass_types/factory.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/prelexer.cpp - /ddf/ui/node_modules/node-sass/src/sass_types/color.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/operation.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/ast.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/sass.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/constants.hpp - /ddf/ui/node_modules/node-sass/src/sass_types/boolean.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/context.hpp - /ddf/ui/node_modules/node-sass/src/sass_types/value.h - /ddf/ui/node_modules/node-sass/src/libsass/src/units.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/cssize.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/parser.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/functions.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/position.hpp - /ddf/ui/node_modules/node-sass/src/sass_context_wrapper.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/sass_context.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/node.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/ast_fwd_decl.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/cssize.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/remove_placeholders.cpp - /ddf/ui/node_modules/node-sass/src/binding.cpp - /ddf/ui/node_modules/node-sass/src/sass_types/list.cpp - /ddf/ui/node_modules/node-sass/src/libsass/include/sass/functions.h - /ddf/ui/node_modules/node-sass/src/custom_function_bridge.cpp - /ddf/ui/node_modules/node-sass/src/custom_importer_bridge.h - /ddf/ui/node_modules/node-sass/src/libsass/src/color_maps.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/utf8_string.cpp - /ddf/ui/node_modules/node-sass/src/sass_types/sass_value_wrapper.h - /ddf/ui/node_modules/node-sass/src/libsass/src/ast.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/values.cpp - /ddf/ui/node_modules/node-sass/src/sass_context_wrapper.h - /ddf/ui/node_modules/node-sass/src/libsass/src/b64/encode.h - /ddf/ui/node_modules/node-sass/src/libsass/src/sass.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/base64vlq.cpp - /ddf/ui/node_modules/node-sass/src/sass_types/number.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/c99func.c - /ddf/ui/node_modules/node-sass/src/libsass/src/node.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/remove_placeholders.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/util.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/memory/SharedPtr.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/backtrace.hpp - /ddf/ui/node_modules/node-sass/src/libsass/include/sass/values.h - /ddf/ui/node_modules/node-sass/src/libsass/test/test_subset_map.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/sass2scss.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/sass_context.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/memory/SharedPtr.cpp - /ddf/ui/node_modules/node-sass/src/sass_types/null.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/expand.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/to_value.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/context.cpp - /ddf/ui/node_modules/node-sass/src/libsass/include/sass/context.h - /ddf/ui/node_modules/node-sass/src/libsass/src/to_c.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/sass_values.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/color_maps.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/inspect.hpp - /ddf/ui/node_modules/node-sass/src/libsass/script/test-leaks.pl - /ddf/ui/node_modules/node-sass/src/libsass/src/to_c.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/util.hpp - /ddf/ui/node_modules/node-sass/src/sass_types/map.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/file.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/units.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/plugins.hpp - /ddf/ui/node_modules/node-sass/src/sass_types/color.h - /ddf/ui/node_modules/node-sass/src/libsass/src/to_value.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/debug.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/parser.hpp </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> An issue was discovered in LibSass through 3.5.2. A NULL pointer dereference was found in the function Sass::Expand::operator which could be leveraged by an attacker to cause a denial of service (application crash) or possibly have unspecified other impact. <p>Publish Date: 2018-06-04 <p>URL: <a href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11695>CVE-2018-11695</a></p> </p> </details> <p></p> <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high severity vulnerability detected by whitesource cve high severity vulnerability vulnerable library node rainbow node js bindings to libsass library home page a href found in head commit a href library source files the source files were matched to this source library based on a best effort match source libraries are selected from a list of probable public libraries ddf ui node modules node sass src libsass src error handling cpp ddf ui node modules node sass src libsass src output cpp ddf ui node modules node sass src libsass src output hpp ddf ui node modules node sass src libsass src check nesting cpp ddf ui node modules node sass src libsass src sass values hpp ddf ui node modules node sass src libsass src check nesting hpp ddf ui node modules node sass src libsass src bind cpp ddf ui node modules node sass src libsass test test node cpp ddf ui node modules node sass src libsass src constants cpp ddf ui node modules node sass src libsass src eval hpp ddf ui node modules node sass src libsass src plugins cpp ddf ui node modules node sass src libsass include sass base h ddf ui node modules node sass src libsass src prelexer hpp ddf ui node modules node sass src libsass src subset map hpp ddf ui node modules node sass src libsass src extend cpp ddf ui node modules node sass src custom importer bridge cpp ddf ui node modules node sass src libsass contrib plugin cpp ddf ui node modules node sass src libsass src lexer hpp ddf ui node modules node sass src libsass src sass util cpp ddf ui node modules node sass src libsass test test superselector cpp ddf ui node modules node sass src libsass src cencode c ddf ui node modules node sass src libsass src ast fwd decl hpp ddf ui node modules node sass src libsass src string hpp ddf ui node modules node sass src libsass src file cpp ddf ui node modules node sass src callback bridge h ddf ui node modules node sass src libsass src subset map cpp ddf ui node modules node sass src libsass include h ddf ui node modules node sass src libsass src sass functions hpp ddf ui node modules node sass src libsass src emitter cpp ddf ui node modules node sass src libsass src environment cpp ddf ui node modules node sass src libsass src ast def macros hpp ddf ui node modules node sass src libsass src paths hpp ddf ui node modules node sass src libsass src expand cpp ddf ui node modules node sass src libsass src listize cpp ddf ui node modules node sass src libsass test test unification cpp ddf ui node modules node sass src libsass src source map cpp ddf ui node modules node sass src libsass src inspect cpp ddf ui node modules node sass src libsass src source map hpp ddf ui node modules node sass src sass types list h ddf ui node modules node sass src libsass src sass functions cpp ddf ui node modules node sass src libsass src json cpp ddf ui node modules node sass src libsass src sass util hpp ddf ui node modules node sass src libsass src position cpp ddf ui node modules node sass src libsass src listize hpp ddf ui node modules node sass src libsass src error handling hpp ddf ui node modules node sass src sass types string cpp ddf ui node modules node sass src libsass src eval cpp ddf ui node modules node sass src libsass src environment hpp ddf ui node modules node sass src sass types boolean h ddf ui node modules node sass src libsass src emitter hpp ddf ui node modules node sass src libsass src extend hpp ddf ui node modules node sass src libsass src lexer cpp ddf ui node modules node sass src libsass src functions cpp ddf ui node modules node sass src libsass src debugger hpp ddf ui node modules node sass src sass types factory cpp ddf ui node modules node sass src libsass src prelexer cpp ddf ui node modules node sass src sass types color cpp ddf ui node modules node sass src libsass src operation hpp ddf ui node modules node sass src libsass src ast cpp ddf ui node modules node sass src libsass src sass hpp ddf ui node modules node sass src libsass src constants hpp ddf ui node modules node sass src sass types boolean cpp ddf ui node modules node sass src libsass src context hpp ddf ui node modules node sass src sass types value h ddf ui node modules node sass src libsass src units cpp ddf ui node modules node sass src libsass src cssize hpp ddf ui node modules node sass src libsass src parser cpp ddf ui node modules node sass src libsass src functions hpp ddf ui node modules node sass src libsass src position hpp ddf ui node modules node sass src sass context wrapper cpp ddf ui node modules node sass src libsass src sass context hpp ddf ui node modules node sass src libsass src node cpp ddf ui node modules node sass src libsass src ast fwd decl cpp ddf ui node modules node sass src libsass src cssize cpp ddf ui node modules node sass src libsass src remove placeholders cpp ddf ui node modules node sass src binding cpp ddf ui node modules node sass src sass types list cpp ddf ui node modules node sass src libsass include sass functions h ddf ui node modules node sass src custom function bridge cpp ddf ui node modules node sass src custom importer bridge h ddf ui node modules node sass src libsass src color maps cpp ddf ui node modules node sass src libsass src string cpp ddf ui node modules node sass src sass types sass value wrapper h ddf ui node modules node sass src libsass src ast hpp ddf ui node modules node sass src libsass src values cpp ddf ui node modules node sass src sass context wrapper h ddf ui node modules node sass src libsass src encode h ddf ui node modules node sass src libsass src sass cpp ddf ui node modules node sass src libsass src cpp ddf ui node modules node sass src sass types number cpp ddf ui node modules node sass src libsass src c ddf ui node modules node sass src libsass src node hpp ddf ui node modules node sass src libsass src remove placeholders hpp ddf ui node modules node sass src libsass src util cpp ddf ui node modules node sass src libsass src memory sharedptr hpp ddf ui node modules node sass src libsass src backtrace hpp ddf ui node modules node sass src libsass include sass values h ddf ui node modules node sass src libsass test test subset map cpp ddf ui node modules node sass src libsass src cpp ddf ui node modules node sass src libsass src sass context cpp ddf ui node modules node sass src libsass src memory sharedptr cpp ddf ui node modules node sass src sass types null cpp ddf ui node modules node sass src libsass src expand hpp ddf ui node modules node sass src libsass src to value hpp ddf ui node modules node sass src libsass src context cpp ddf ui node modules node sass src libsass include sass context h ddf ui node modules node sass src libsass src to c cpp ddf ui node modules node sass src libsass src sass values cpp ddf ui node modules node sass src libsass src color maps hpp ddf ui node modules node sass src libsass src inspect hpp ddf ui node modules node sass src libsass script test leaks pl ddf ui node modules node sass src libsass src to c hpp ddf ui node modules node sass src libsass src util hpp ddf ui node modules node sass src sass types map cpp ddf ui node modules node sass src libsass src file hpp ddf ui node modules node sass src libsass src units hpp ddf ui node modules node sass src libsass src plugins hpp ddf ui node modules node sass src sass types color h ddf ui node modules node sass src libsass src to value cpp ddf ui node modules node sass src libsass src debug hpp ddf ui node modules node sass src libsass src parser hpp vulnerability details an issue was discovered in libsass through a null pointer dereference was found in the function sass expand operator which could be leveraged by an attacker to cause a denial of service application crash or possibly have unspecified other impact publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href step up your open source security game with whitesource
0
38,449
6,671,655,675
IssuesEvent
2017-10-04 08:21:22
encode/django-rest-framework
https://api.github.com/repos/encode/django-rest-framework
closed
Documenting your API: add highlighted chunk of code in docstrings
Enhancement Interactive API Documentation
Thinking that also highlighted code-blocks were enabled in the dynamic documentation I started to investigate why code-block (also without highlight) not works and at the end I found that there is a strip that remove any kind of indentation, that is bad for code-blocks. ``` --- schemas_orig.py 2017-08-30 14:45:38.061047196 +0000 +++ schemas.py 2017-08-30 14:46:10.317254482 +0000 @@ -476,7 +476,7 @@ return formatting.dedent(smart_text(method_docstring)) description = view.get_view_description() - lines = [line.strip() for line in description.splitlines()] + lines = [line for line in description.splitlines()] current_section = '' sections = {'': ''} ``` At the end, adding this change and a proper Preprocessor for markdown in the ``render_markdown`` function I achieved my goal: ![drf-new-feature](https://user-images.githubusercontent.com/1670278/29878850-dcd0de54-8da3-11e7-833b-7d3f4b66741c.png) Starting from this docstring: ``` """ get: Return the list of country objects with **iso2**, **name** and **region** fields. @@ json @@ [ { "first": "string-value", "second": null }, { "one": 1, "two": 2 } ] @@ """ ``` I want to submit a PR with this (small) change but before I would know if the ``line.strip()`` has a precise meaning and cannot be removed or not. Thank you, Matteo.
1.0
Documenting your API: add highlighted chunk of code in docstrings - Thinking that also highlighted code-blocks were enabled in the dynamic documentation I started to investigate why code-block (also without highlight) not works and at the end I found that there is a strip that remove any kind of indentation, that is bad for code-blocks. ``` --- schemas_orig.py 2017-08-30 14:45:38.061047196 +0000 +++ schemas.py 2017-08-30 14:46:10.317254482 +0000 @@ -476,7 +476,7 @@ return formatting.dedent(smart_text(method_docstring)) description = view.get_view_description() - lines = [line.strip() for line in description.splitlines()] + lines = [line for line in description.splitlines()] current_section = '' sections = {'': ''} ``` At the end, adding this change and a proper Preprocessor for markdown in the ``render_markdown`` function I achieved my goal: ![drf-new-feature](https://user-images.githubusercontent.com/1670278/29878850-dcd0de54-8da3-11e7-833b-7d3f4b66741c.png) Starting from this docstring: ``` """ get: Return the list of country objects with **iso2**, **name** and **region** fields. @@ json @@ [ { "first": "string-value", "second": null }, { "one": 1, "two": 2 } ] @@ """ ``` I want to submit a PR with this (small) change but before I would know if the ``line.strip()`` has a precise meaning and cannot be removed or not. Thank you, Matteo.
non_priority
documenting your api add highlighted chunk of code in docstrings thinking that also highlighted code blocks were enabled in the dynamic documentation i started to investigate why code block also without highlight not works and at the end i found that there is a strip that remove any kind of indentation that is bad for code blocks schemas orig py schemas py return formatting dedent smart text method docstring description view get view description lines lines current section sections at the end adding this change and a proper preprocessor for markdown in the render markdown function i achieved my goal starting from this docstring get return the list of country objects with name and region fields json first string value second null one two i want to submit a pr with this small change but before i would know if the line strip has a precise meaning and cannot be removed or not thank you matteo
0
262,596
27,972,681,020
IssuesEvent
2023-03-25 07:29:32
elastic/integrations
https://api.github.com/repos/elastic/integrations
closed
[Check Point] Improved Documentation
Team:Security-External Integrations Integration:Checkpoint
Our [Check Point integration](https://docs.elastic.co/integrations/checkpoint) does not follow our [documentation guidelines](https://github.com/elastic/integrations/blob/main/docs/documentation_guidelines.md) and needs to be updated to ensure users can successfully configure the integration. Our documentation can be based on the steps to configure Checkpoint's current R81 OS - no need to focus on steps for EOL OS such as R80 and R77. I'll can get a marketing blurb from Check Point, but the biggest gap in our docs is the configuration steps on the Log Exporter side. We need to make clear, the steps involved on the Log Exporter side to syslog out to an Elastic Agent. We need to make it clear which syslog formats we support, and how to configure Secure Syslog (over TLS). High level steps (needs refinement): 1. Install Elastic Agent on a host between your Check Point Log Exporter instance and Elastic Cluster. The agent will be used to receive syslog from Check Point firewalls and ship to Elastic. 2. Create a new [Log Exporter/SIEM object](https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_LoggingAndMonitoring_AdminGuide/Topics-LMG/Log-Exporter-Configuration-in-SmartConsole.htm?tocpath=Log%20Exporter%7C_____2) in Check Point SmartConsole. Set the target server and target port to the Elastic Agent IP address and port number. Set the protocol to UDP or TCP, Elastic's integration supports both. Set the format to syslog, JSON?? 3. Configure the Management Server or Dedicated Log Server object in SmartConsole. 4. Install the database within SmartConsole (steps included in the Checkpoint docs linked above) 5. Within Kibana, browse to Integrations and locate the Check Point integration, and 'Add Check Point' 6. Configure the TCP or UDP input, depending on the protocol you configured Check Point to use. 7. Add certificate if using Secure Syslog over TCP with TLS (optional) 8. Add integration to a New/Existing policy. 9. Browse to dashboard/discover to validate data is flowing from Check Point. We also list 'firewall' as the supported dataset - do we support all events from Check Point firewalls, if so this should be clearly stated. If not, we need to list the broad categories of events we support.
True
[Check Point] Improved Documentation - Our [Check Point integration](https://docs.elastic.co/integrations/checkpoint) does not follow our [documentation guidelines](https://github.com/elastic/integrations/blob/main/docs/documentation_guidelines.md) and needs to be updated to ensure users can successfully configure the integration. Our documentation can be based on the steps to configure Checkpoint's current R81 OS - no need to focus on steps for EOL OS such as R80 and R77. I'll can get a marketing blurb from Check Point, but the biggest gap in our docs is the configuration steps on the Log Exporter side. We need to make clear, the steps involved on the Log Exporter side to syslog out to an Elastic Agent. We need to make it clear which syslog formats we support, and how to configure Secure Syslog (over TLS). High level steps (needs refinement): 1. Install Elastic Agent on a host between your Check Point Log Exporter instance and Elastic Cluster. The agent will be used to receive syslog from Check Point firewalls and ship to Elastic. 2. Create a new [Log Exporter/SIEM object](https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_LoggingAndMonitoring_AdminGuide/Topics-LMG/Log-Exporter-Configuration-in-SmartConsole.htm?tocpath=Log%20Exporter%7C_____2) in Check Point SmartConsole. Set the target server and target port to the Elastic Agent IP address and port number. Set the protocol to UDP or TCP, Elastic's integration supports both. Set the format to syslog, JSON?? 3. Configure the Management Server or Dedicated Log Server object in SmartConsole. 4. Install the database within SmartConsole (steps included in the Checkpoint docs linked above) 5. Within Kibana, browse to Integrations and locate the Check Point integration, and 'Add Check Point' 6. Configure the TCP or UDP input, depending on the protocol you configured Check Point to use. 7. Add certificate if using Secure Syslog over TCP with TLS (optional) 8. Add integration to a New/Existing policy. 9. Browse to dashboard/discover to validate data is flowing from Check Point. We also list 'firewall' as the supported dataset - do we support all events from Check Point firewalls, if so this should be clearly stated. If not, we need to list the broad categories of events we support.
non_priority
improved documentation our does not follow our and needs to be updated to ensure users can successfully configure the integration our documentation can be based on the steps to configure checkpoint s current os no need to focus on steps for eol os such as and i ll can get a marketing blurb from check point but the biggest gap in our docs is the configuration steps on the log exporter side we need to make clear the steps involved on the log exporter side to syslog out to an elastic agent we need to make it clear which syslog formats we support and how to configure secure syslog over tls high level steps needs refinement install elastic agent on a host between your check point log exporter instance and elastic cluster the agent will be used to receive syslog from check point firewalls and ship to elastic create a new in check point smartconsole set the target server and target port to the elastic agent ip address and port number set the protocol to udp or tcp elastic s integration supports both set the format to syslog json configure the management server or dedicated log server object in smartconsole install the database within smartconsole steps included in the checkpoint docs linked above within kibana browse to integrations and locate the check point integration and add check point configure the tcp or udp input depending on the protocol you configured check point to use add certificate if using secure syslog over tcp with tls optional add integration to a new existing policy browse to dashboard discover to validate data is flowing from check point we also list firewall as the supported dataset do we support all events from check point firewalls if so this should be clearly stated if not we need to list the broad categories of events we support
0
27,503
21,795,357,227
IssuesEvent
2022-05-15 14:48:55
dotnet/sdk
https://api.github.com/repos/dotnet/sdk
closed
Single EXE build takes minutes to launch, self contained build launches in seconds
Area-Infrastructure untriaged
### Describe the bug Links two different builds of the same program: - Self contained, ready to run, win-x86 - [selfcontained.zip](https://drive.google.com/file/d/1ePBlypgj5QspcndbHw412vRMgWtbPDwo/view?usp=sharing) - Single EXE, ready to run, win-86 - [singleexe.zip](https://drive.google.com/file/d/1VGUauy-8Q4G4_9qJq05cXaMJNxnCO_yk/view?usp=sharing) Both programs run, however the single EXE version takes over two minutes to display the first screen. The self-contained version launches in seconds. Builds are NOT trimmed. Code can be found at https://github.com/mike-ward/Loon ### Further technical details - Include the output of `dotnet --info` ``` ► dotnet --info .NET SDK (reflecting any global.json): Version: 6.0.300 Commit: 8473146e7d Runtime Environment: OS Name: Windows OS Version: 10.0.19043 OS Platform: Windows RID: win10-x64 Base Path: C:\Program Files\dotnet\sdk\6.0.300\ Host (useful for support): Version: 7.0.0-preview.1.22076.8 Commit: 405337939c .NET SDKs installed: 2.2.207 [C:\Program Files\dotnet\sdk] 3.1.416 [C:\Program Files\dotnet\sdk] 6.0.101 [C:\Program Files\dotnet\sdk] 6.0.201 [C:\Program Files\dotnet\sdk] 6.0.300 [C:\Program Files\dotnet\sdk] .NET runtimes installed: Microsoft.AspNetCore.All 2.2.8 [C:\Program Files\dotnet\shared\Microsoft.AspNetCore.All] Microsoft.AspNetCore.App 2.2.8 [C:\Program Files\dotnet\shared\Microsoft.AspNetCore.App] Microsoft.AspNetCore.App 3.1.22 [C:\Program Files\dotnet\shared\Microsoft.AspNetCore.App] Microsoft.AspNetCore.App 6.0.1 [C:\Program Files\dotnet\shared\Microsoft.AspNetCore.App] Microsoft.AspNetCore.App 6.0.3 [C:\Program Files\dotnet\shared\Microsoft.AspNetCore.App] Microsoft.AspNetCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.AspNetCore.App] Microsoft.NETCore.App 2.2.8 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App] Microsoft.NETCore.App 3.1.22 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App] Microsoft.NETCore.App 3.1.23 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App] Microsoft.NETCore.App 5.0.14 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App] Microsoft.NETCore.App 6.0.1 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App] Microsoft.NETCore.App 6.0.3 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App] Microsoft.NETCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App] Microsoft.NETCore.App 7.0.0-preview.1.22076.8 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App] Microsoft.WindowsDesktop.App 3.1.22 [C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App] Microsoft.WindowsDesktop.App 3.1.23 [C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App] Microsoft.WindowsDesktop.App 5.0.14 [C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App] Microsoft.WindowsDesktop.App 6.0.1 [C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App] Microsoft.WindowsDesktop.App 6.0.3 [C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App] Microsoft.WindowsDesktop.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App] ``` - The IDE (VS / VS Code/ VS4Mac) you're running on, and its version ``` JetBrains Rider 2022.1.1 Build #RD-221.5591.20, built on April 28, 2022 Runtime version: 11.0.14.1+1-b2043.45 amd64 VM: Dynamic Code Evolution 64-Bit Server VM by JetBrains s.r.o. Windows 10 10.0 .NET Framework 4.0.30319.42000 GC: G1 Young Generation, G1 Old Generation Memory: 1500M Cores: 8 Registry: rdclient.asyncActions=false ide.new.project.model.index.case.sensitivity=true indexing.enable.entity.provider.based.indexing=false Non-Bundled Plugins: net.seesharpsoft.intellij.plugins.csv (2.18.2) com.intellij.resharper.HeapAllocationsViewer (2022.1.0) com.intellij.javafx (1.0.4) com.intellij.ideolog (203.0.28.1) avalonia-rider (1.0.0.2140933513) com.jetbrains.rider.android (221.5591.20) ```
1.0
Single EXE build takes minutes to launch, self contained build launches in seconds - ### Describe the bug Links two different builds of the same program: - Self contained, ready to run, win-x86 - [selfcontained.zip](https://drive.google.com/file/d/1ePBlypgj5QspcndbHw412vRMgWtbPDwo/view?usp=sharing) - Single EXE, ready to run, win-86 - [singleexe.zip](https://drive.google.com/file/d/1VGUauy-8Q4G4_9qJq05cXaMJNxnCO_yk/view?usp=sharing) Both programs run, however the single EXE version takes over two minutes to display the first screen. The self-contained version launches in seconds. Builds are NOT trimmed. Code can be found at https://github.com/mike-ward/Loon ### Further technical details - Include the output of `dotnet --info` ``` ► dotnet --info .NET SDK (reflecting any global.json): Version: 6.0.300 Commit: 8473146e7d Runtime Environment: OS Name: Windows OS Version: 10.0.19043 OS Platform: Windows RID: win10-x64 Base Path: C:\Program Files\dotnet\sdk\6.0.300\ Host (useful for support): Version: 7.0.0-preview.1.22076.8 Commit: 405337939c .NET SDKs installed: 2.2.207 [C:\Program Files\dotnet\sdk] 3.1.416 [C:\Program Files\dotnet\sdk] 6.0.101 [C:\Program Files\dotnet\sdk] 6.0.201 [C:\Program Files\dotnet\sdk] 6.0.300 [C:\Program Files\dotnet\sdk] .NET runtimes installed: Microsoft.AspNetCore.All 2.2.8 [C:\Program Files\dotnet\shared\Microsoft.AspNetCore.All] Microsoft.AspNetCore.App 2.2.8 [C:\Program Files\dotnet\shared\Microsoft.AspNetCore.App] Microsoft.AspNetCore.App 3.1.22 [C:\Program Files\dotnet\shared\Microsoft.AspNetCore.App] Microsoft.AspNetCore.App 6.0.1 [C:\Program Files\dotnet\shared\Microsoft.AspNetCore.App] Microsoft.AspNetCore.App 6.0.3 [C:\Program Files\dotnet\shared\Microsoft.AspNetCore.App] Microsoft.AspNetCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.AspNetCore.App] Microsoft.NETCore.App 2.2.8 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App] Microsoft.NETCore.App 3.1.22 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App] Microsoft.NETCore.App 3.1.23 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App] Microsoft.NETCore.App 5.0.14 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App] Microsoft.NETCore.App 6.0.1 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App] Microsoft.NETCore.App 6.0.3 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App] Microsoft.NETCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App] Microsoft.NETCore.App 7.0.0-preview.1.22076.8 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App] Microsoft.WindowsDesktop.App 3.1.22 [C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App] Microsoft.WindowsDesktop.App 3.1.23 [C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App] Microsoft.WindowsDesktop.App 5.0.14 [C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App] Microsoft.WindowsDesktop.App 6.0.1 [C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App] Microsoft.WindowsDesktop.App 6.0.3 [C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App] Microsoft.WindowsDesktop.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App] ``` - The IDE (VS / VS Code/ VS4Mac) you're running on, and its version ``` JetBrains Rider 2022.1.1 Build #RD-221.5591.20, built on April 28, 2022 Runtime version: 11.0.14.1+1-b2043.45 amd64 VM: Dynamic Code Evolution 64-Bit Server VM by JetBrains s.r.o. Windows 10 10.0 .NET Framework 4.0.30319.42000 GC: G1 Young Generation, G1 Old Generation Memory: 1500M Cores: 8 Registry: rdclient.asyncActions=false ide.new.project.model.index.case.sensitivity=true indexing.enable.entity.provider.based.indexing=false Non-Bundled Plugins: net.seesharpsoft.intellij.plugins.csv (2.18.2) com.intellij.resharper.HeapAllocationsViewer (2022.1.0) com.intellij.javafx (1.0.4) com.intellij.ideolog (203.0.28.1) avalonia-rider (1.0.0.2140933513) com.jetbrains.rider.android (221.5591.20) ```
non_priority
single exe build takes minutes to launch self contained build launches in seconds describe the bug links two different builds of the same program self contained ready to run win single exe ready to run win both programs run however the single exe version takes over two minutes to display the first screen the self contained version launches in seconds builds are not trimmed code can be found at further technical details include the output of dotnet info ► dotnet info net sdk reflecting any global json version commit runtime environment os name windows os version os platform windows rid base path c program files dotnet sdk host useful for support version preview commit net sdks installed net runtimes installed microsoft aspnetcore all microsoft aspnetcore app microsoft aspnetcore app microsoft aspnetcore app microsoft aspnetcore app microsoft aspnetcore app microsoft netcore app microsoft netcore app microsoft netcore app microsoft netcore app microsoft netcore app microsoft netcore app microsoft netcore app microsoft netcore app preview microsoft windowsdesktop app microsoft windowsdesktop app microsoft windowsdesktop app microsoft windowsdesktop app microsoft windowsdesktop app microsoft windowsdesktop app the ide vs vs code you re running on and its version jetbrains rider build rd built on april runtime version vm dynamic code evolution bit server vm by jetbrains s r o windows net framework gc young generation old generation memory cores registry rdclient asyncactions false ide new project model index case sensitivity true indexing enable entity provider based indexing false non bundled plugins net seesharpsoft intellij plugins csv com intellij resharper heapallocationsviewer com intellij javafx com intellij ideolog avalonia rider com jetbrains rider android
0
177,534
21,478,663,310
IssuesEvent
2022-04-26 15:38:14
tamirverthim/fitbit-api-example-java
https://api.github.com/repos/tamirverthim/fitbit-api-example-java
closed
CVE-2017-12597 High Severity Vulnerability detected by WhiteSource - autoclosed
security vulnerability
## CVE-2017-12597 - High Severity Vulnerability <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>spring-webmvc-4.3.2.RELEASE.jar</b></p></summary> <p>Spring Web MVC</p> <p>path: /root/.m2/repository/org/springframework/spring-webmvc/4.3.2.RELEASE/spring-webmvc-4.3.2.RELEASE.jar</p> <p> <p>Library home page: <a href=https://github.com/spring-projects/spring-framework>https://github.com/spring-projects/spring-framework</a></p> Dependency Hierarchy: - spring-boot-starter-web-1.4.0.RELEASE.jar (Root Library) - :x: **spring-webmvc-4.3.2.RELEASE.jar** (Vulnerable Library) <p>Found in commit: <a href="https://github.com/tamirverthim/fitbit-api-example-java/commit/46d2ce7c36b9dd12bdeda63322ba7793eefcb0bb">46d2ce7c36b9dd12bdeda63322ba7793eefcb0bb</a></p> </p> </details> <p></p> <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> OpenCV (Open Source Computer Vision Library) through 3.3 has an out-of-bounds write error in the function FillColorRow1 in utils.cpp when reading an image file by using cv::imread. <p>Publish Date: 2017-08-07 <p>URL: <a href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12597>CVE-2017-12597</a></p> </p> </details> <p></p> <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Change files</p> <p>Origin: <a href="https://github.com/spring-projects/spring-framework/commit/e2d6e709c3c65a4951eb096843ee75d5200cfcad">https://github.com/spring-projects/spring-framework/commit/e2d6e709c3c65a4951eb096843ee75d5200cfcad</a></p> <p>Release Date: 2016-12-21</p> <p>Fix Resolution: Replace or update the following files: ResourceServletTests.java, ResourceServlet.java</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2017-12597 High Severity Vulnerability detected by WhiteSource - autoclosed - ## CVE-2017-12597 - High Severity Vulnerability <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>spring-webmvc-4.3.2.RELEASE.jar</b></p></summary> <p>Spring Web MVC</p> <p>path: /root/.m2/repository/org/springframework/spring-webmvc/4.3.2.RELEASE/spring-webmvc-4.3.2.RELEASE.jar</p> <p> <p>Library home page: <a href=https://github.com/spring-projects/spring-framework>https://github.com/spring-projects/spring-framework</a></p> Dependency Hierarchy: - spring-boot-starter-web-1.4.0.RELEASE.jar (Root Library) - :x: **spring-webmvc-4.3.2.RELEASE.jar** (Vulnerable Library) <p>Found in commit: <a href="https://github.com/tamirverthim/fitbit-api-example-java/commit/46d2ce7c36b9dd12bdeda63322ba7793eefcb0bb">46d2ce7c36b9dd12bdeda63322ba7793eefcb0bb</a></p> </p> </details> <p></p> <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> OpenCV (Open Source Computer Vision Library) through 3.3 has an out-of-bounds write error in the function FillColorRow1 in utils.cpp when reading an image file by using cv::imread. <p>Publish Date: 2017-08-07 <p>URL: <a href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12597>CVE-2017-12597</a></p> </p> </details> <p></p> <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Change files</p> <p>Origin: <a href="https://github.com/spring-projects/spring-framework/commit/e2d6e709c3c65a4951eb096843ee75d5200cfcad">https://github.com/spring-projects/spring-framework/commit/e2d6e709c3c65a4951eb096843ee75d5200cfcad</a></p> <p>Release Date: 2016-12-21</p> <p>Fix Resolution: Replace or update the following files: ResourceServletTests.java, ResourceServlet.java</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high severity vulnerability detected by whitesource autoclosed cve high severity vulnerability vulnerable library spring webmvc release jar spring web mvc path root repository org springframework spring webmvc release spring webmvc release jar library home page a href dependency hierarchy spring boot starter web release jar root library x spring webmvc release jar vulnerable library found in commit a href vulnerability details opencv open source computer vision library through has an out of bounds write error in the function in utils cpp when reading an image file by using cv imread publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type change files origin a href release date fix resolution replace or update the following files resourceservlettests java resourceservlet java step up your open source security game with whitesource
0
331,772
24,325,429,356
IssuesEvent
2022-09-30 14:23:43
connor-makowski/type_enforced
https://api.github.com/repos/connor-makowski/type_enforced
closed
Fix broken docstrings related to functools.partial
bug documentation
When using docstrings in classes and calling type_enforced, the headers for help strings get broken by functools.partial
1.0
Fix broken docstrings related to functools.partial - When using docstrings in classes and calling type_enforced, the headers for help strings get broken by functools.partial
non_priority
fix broken docstrings related to functools partial when using docstrings in classes and calling type enforced the headers for help strings get broken by functools partial
0
82,170
32,038,554,837
IssuesEvent
2023-09-22 17:17:17
SasView/sasview
https://api.github.com/repos/SasView/sasview
closed
better custom model error diagnostics (Trac #570)
Defect Major
When defining a custom model but having a bad parameter table, the custom model compile menu item claimed that the model loaded without difficulty. Similarly when there were errors in the C code for the model. The compile button needs to run the model with some nominal value (e.g., Iq([0.1, 0.2, 0.3]) and Iqxy([0.1, 0.2, 0.3], [0.1, 0.2, 0.3]) to make sure that the model runs with the default parameters. Any errors returned by the compiler should be displayed. Check that errors are captured and returned for bad opencl models on the various OpenCL environments (mac GPU, mac CPU, windows nvidia, windows radeon, windows intel) and for kerneldll under windows with the tcc compiler. For pure python models, check that python code with Iq.vectorized=True but if statements in the code shows the correct errors. These tests belong in the sasmodels package. Make sure that the appropriate compiler output gets captured as part of the test. The sasview gui only needs to demonstrate that bad output gets displayed to the user, but does not need to run the tests as part of the test suite. Migrated from http://trac.sasview.org/ticket/570 ```json { "status": "new", "changetime": "2016-08-16T16:49:22", "_ts": "2016-08-16 16:49:22.954125+00:00", "description": "When defining a custom model but having a bad parameter table, the custom model compile menu item claimed that the model loaded without difficulty. Similarly when there were errors in the C code for the model.\n\nThe compile button needs to run the model with some nominal value (e.g., Iq([0.1, 0.2, 0.3]) and Iqxy([0.1, 0.2, 0.3], [0.1, 0.2, 0.3]) to make sure that the model runs with the default parameters. Any errors returned by the compiler should be displayed.\n\nCheck that errors are captured and returned for bad opencl models on the various OpenCL environments (mac GPU, mac CPU, windows nvidia, windows radeon, windows intel) and for kerneldll under windows with the tcc compiler.\n\nFor pure python models, check that python code with Iq.vectorized=True but if statements in the code shows the correct errors.\n\nThese tests belong in the sasmodels package. Make sure that the appropriate compiler output gets captured as part of the test. The sasview gui only needs to demonstrate that bad output gets displayed to the user, but does not need to run the tests as part of the test suite.\n", "reporter": "pkienzle", "cc": "", "resolution": "", "workpackage": "SasView Bug Fixing", "time": "2016-05-03T21:13:02", "component": "SasView", "summary": "better custom model error diagnostics", "priority": "major", "keywords": "", "milestone": "SasView Next Release +1", "owner": "", "type": "defect" } ```
1.0
better custom model error diagnostics (Trac #570) - When defining a custom model but having a bad parameter table, the custom model compile menu item claimed that the model loaded without difficulty. Similarly when there were errors in the C code for the model. The compile button needs to run the model with some nominal value (e.g., Iq([0.1, 0.2, 0.3]) and Iqxy([0.1, 0.2, 0.3], [0.1, 0.2, 0.3]) to make sure that the model runs with the default parameters. Any errors returned by the compiler should be displayed. Check that errors are captured and returned for bad opencl models on the various OpenCL environments (mac GPU, mac CPU, windows nvidia, windows radeon, windows intel) and for kerneldll under windows with the tcc compiler. For pure python models, check that python code with Iq.vectorized=True but if statements in the code shows the correct errors. These tests belong in the sasmodels package. Make sure that the appropriate compiler output gets captured as part of the test. The sasview gui only needs to demonstrate that bad output gets displayed to the user, but does not need to run the tests as part of the test suite. Migrated from http://trac.sasview.org/ticket/570 ```json { "status": "new", "changetime": "2016-08-16T16:49:22", "_ts": "2016-08-16 16:49:22.954125+00:00", "description": "When defining a custom model but having a bad parameter table, the custom model compile menu item claimed that the model loaded without difficulty. Similarly when there were errors in the C code for the model.\n\nThe compile button needs to run the model with some nominal value (e.g., Iq([0.1, 0.2, 0.3]) and Iqxy([0.1, 0.2, 0.3], [0.1, 0.2, 0.3]) to make sure that the model runs with the default parameters. Any errors returned by the compiler should be displayed.\n\nCheck that errors are captured and returned for bad opencl models on the various OpenCL environments (mac GPU, mac CPU, windows nvidia, windows radeon, windows intel) and for kerneldll under windows with the tcc compiler.\n\nFor pure python models, check that python code with Iq.vectorized=True but if statements in the code shows the correct errors.\n\nThese tests belong in the sasmodels package. Make sure that the appropriate compiler output gets captured as part of the test. The sasview gui only needs to demonstrate that bad output gets displayed to the user, but does not need to run the tests as part of the test suite.\n", "reporter": "pkienzle", "cc": "", "resolution": "", "workpackage": "SasView Bug Fixing", "time": "2016-05-03T21:13:02", "component": "SasView", "summary": "better custom model error diagnostics", "priority": "major", "keywords": "", "milestone": "SasView Next Release +1", "owner": "", "type": "defect" } ```
non_priority
better custom model error diagnostics trac when defining a custom model but having a bad parameter table the custom model compile menu item claimed that the model loaded without difficulty similarly when there were errors in the c code for the model the compile button needs to run the model with some nominal value e g iq and iqxy to make sure that the model runs with the default parameters any errors returned by the compiler should be displayed check that errors are captured and returned for bad opencl models on the various opencl environments mac gpu mac cpu windows nvidia windows radeon windows intel and for kerneldll under windows with the tcc compiler for pure python models check that python code with iq vectorized true but if statements in the code shows the correct errors these tests belong in the sasmodels package make sure that the appropriate compiler output gets captured as part of the test the sasview gui only needs to demonstrate that bad output gets displayed to the user but does not need to run the tests as part of the test suite migrated from json status new changetime ts description when defining a custom model but having a bad parameter table the custom model compile menu item claimed that the model loaded without difficulty similarly when there were errors in the c code for the model n nthe compile button needs to run the model with some nominal value e g iq and iqxy to make sure that the model runs with the default parameters any errors returned by the compiler should be displayed n ncheck that errors are captured and returned for bad opencl models on the various opencl environments mac gpu mac cpu windows nvidia windows radeon windows intel and for kerneldll under windows with the tcc compiler n nfor pure python models check that python code with iq vectorized true but if statements in the code shows the correct errors n nthese tests belong in the sasmodels package make sure that the appropriate compiler output gets captured as part of the test the sasview gui only needs to demonstrate that bad output gets displayed to the user but does not need to run the tests as part of the test suite n reporter pkienzle cc resolution workpackage sasview bug fixing time component sasview summary better custom model error diagnostics priority major keywords milestone sasview next release owner type defect
0
349,101
31,774,669,744
IssuesEvent
2023-09-12 13:47:50
red-hat-storage/ocs-ci
https://api.github.com/repos/red-hat-storage/ocs-ci
opened
Test Mon Failures with In-Transit Encryption Tests Failing on Teardown
TestCase failing Squad/Green
Description: During the execution of the "test_mon_failures_with_intransit_encryption" a test failure occurred during the teardown phase. The failure message indicates the following: Test Name: test_mon_failures_with_intransit_encryption Failure Message: "Failed on teardown with 'ocs_ci.ocs.exceptions.CephHealthException: Ceph cluster health is not OK. Health: HEALTH_WARN 1/3 mons down, quorum b,c'" RUN ID: https://reportportal-ocs4.apps.ocp-c1.prod.psi.redhat.com/ui/#ocs/launches/465/13465/615439/615440/615441/log
1.0
Test Mon Failures with In-Transit Encryption Tests Failing on Teardown - Description: During the execution of the "test_mon_failures_with_intransit_encryption" a test failure occurred during the teardown phase. The failure message indicates the following: Test Name: test_mon_failures_with_intransit_encryption Failure Message: "Failed on teardown with 'ocs_ci.ocs.exceptions.CephHealthException: Ceph cluster health is not OK. Health: HEALTH_WARN 1/3 mons down, quorum b,c'" RUN ID: https://reportportal-ocs4.apps.ocp-c1.prod.psi.redhat.com/ui/#ocs/launches/465/13465/615439/615440/615441/log
non_priority
test mon failures with in transit encryption tests failing on teardown description during the execution of the test mon failures with intransit encryption a test failure occurred during the teardown phase the failure message indicates the following test name test mon failures with intransit encryption failure message failed on teardown with ocs ci ocs exceptions cephhealthexception ceph cluster health is not ok health health warn mons down quorum b c run id
0
115,996
11,893,353,635
IssuesEvent
2020-03-29 11:09:41
mtyn/polar
https://api.github.com/repos/mtyn/polar
closed
Vim screenshot shows in progress theme
documentation
The screenshot for vim shows colours that shouldn't be used in this theme. This has since been fixed, but the screenshot wasn't updated. Fix the screenshot.
1.0
Vim screenshot shows in progress theme - The screenshot for vim shows colours that shouldn't be used in this theme. This has since been fixed, but the screenshot wasn't updated. Fix the screenshot.
non_priority
vim screenshot shows in progress theme the screenshot for vim shows colours that shouldn t be used in this theme this has since been fixed but the screenshot wasn t updated fix the screenshot
0
86,913
8,053,393,745
IssuesEvent
2018-08-01 22:48:07
Microsoft/AzureStorageExplorer
https://api.github.com/repos/Microsoft/AzureStorageExplorer
closed
There is no prompt message after inputting Unicode characters for blob's properties
:white_check_mark: merged testing
**Storage Explorer Version**: 1.4.0 **Platform/OS Version**: Windows/Linux Ubuntu 16.04/Mac **Architecture**: ia32/x64 **Build Number**:20180801.3 **Commit**: 7cdb5326 **Regression From**: Not a regression #### Steps to Reproduce: #### 1. Expand one account -> Open a blob container which contains one blob at least. 2. Right click the blob then select 'Properties...'. 3. Input Unicode characters '非法字符' for one blob property like 'ContentEncoding'. 4. Check whether the prompt message displays or not. #### Expected Experience: #### It displays a prompt message after inputting Unicode characters for one blob's property. #### Actual Experience: #### No prompt message displays after inputting Unicode characters for one blob's property. ![compare](https://user-images.githubusercontent.com/41351993/43512876-c59f49b6-956b-11e8-902f-859216d3adba.png)
1.0
There is no prompt message after inputting Unicode characters for blob's properties - **Storage Explorer Version**: 1.4.0 **Platform/OS Version**: Windows/Linux Ubuntu 16.04/Mac **Architecture**: ia32/x64 **Build Number**:20180801.3 **Commit**: 7cdb5326 **Regression From**: Not a regression #### Steps to Reproduce: #### 1. Expand one account -> Open a blob container which contains one blob at least. 2. Right click the blob then select 'Properties...'. 3. Input Unicode characters '非法字符' for one blob property like 'ContentEncoding'. 4. Check whether the prompt message displays or not. #### Expected Experience: #### It displays a prompt message after inputting Unicode characters for one blob's property. #### Actual Experience: #### No prompt message displays after inputting Unicode characters for one blob's property. ![compare](https://user-images.githubusercontent.com/41351993/43512876-c59f49b6-956b-11e8-902f-859216d3adba.png)
non_priority
there is no prompt message after inputting unicode characters for blob s properties storage explorer version platform os version windows linux ubuntu mac architecture build number commit regression from not a regression steps to reproduce expand one account open a blob container which contains one blob at least right click the blob then select properties input unicode characters 非法字符 for one blob property like contentencoding check whether the prompt message displays or not expected experience it displays a prompt message after inputting unicode characters for one blob s property actual experience no prompt message displays after inputting unicode characters for one blob s property
0
29,816
13,173,420,308
IssuesEvent
2020-08-11 20:17:08
dockstore/dockstore
https://api.github.com/repos/dockstore/dockstore
closed
Galaxy subclass should be GALAXY in .dockstore.yml
bug review web-service
**Describe the bug** To specify a Galaxy workflow in .dockstore.yml, you currently specify subclass `GXFORMAT2`. This is imprecise, because Dockstore is able to handle both the old and new formats of Galaxy workflows. **Describe the solution you'd like** Allow the subclass to be `GALAXY` in Dockstore workflows. For backwards compatibiity, we should continue to support GXFORMAT2 in the .dockstore.yml **Additional context** See [this discusion](https://github.com/galaxyproject/training-material/pull/1990#discussion_r459577857). - Webservice version: 1.9.0 - Platform: dockstore.org ┆Issue is synchronized with this [Jira Story](https://ucsc-cgl.atlassian.net/browse/DOCK-1510) ┆Issue Type: Story ┆Fix Versions: Dockstore 1.9.X ┆Sprint: Backlog ┆Issue Number: DOCK-1510
1.0
Galaxy subclass should be GALAXY in .dockstore.yml - **Describe the bug** To specify a Galaxy workflow in .dockstore.yml, you currently specify subclass `GXFORMAT2`. This is imprecise, because Dockstore is able to handle both the old and new formats of Galaxy workflows. **Describe the solution you'd like** Allow the subclass to be `GALAXY` in Dockstore workflows. For backwards compatibiity, we should continue to support GXFORMAT2 in the .dockstore.yml **Additional context** See [this discusion](https://github.com/galaxyproject/training-material/pull/1990#discussion_r459577857). - Webservice version: 1.9.0 - Platform: dockstore.org ┆Issue is synchronized with this [Jira Story](https://ucsc-cgl.atlassian.net/browse/DOCK-1510) ┆Issue Type: Story ┆Fix Versions: Dockstore 1.9.X ┆Sprint: Backlog ┆Issue Number: DOCK-1510
non_priority
galaxy subclass should be galaxy in dockstore yml describe the bug to specify a galaxy workflow in dockstore yml you currently specify subclass this is imprecise because dockstore is able to handle both the old and new formats of galaxy workflows describe the solution you d like allow the subclass to be galaxy in dockstore workflows for backwards compatibiity we should continue to support in the dockstore yml additional context see webservice version platform dockstore org ┆issue is synchronized with this ┆issue type story ┆fix versions dockstore x ┆sprint backlog ┆issue number dock
0
8,048
7,196,736,612
IssuesEvent
2018-02-05 05:18:05
kolide/fleet
https://api.github.com/repos/kolide/fleet
closed
Add windows network information to cards
Feature: Infrastructure Good First Issue Help Wanted
Originally, we left off network information (IP address, MAC, etc) from host cards because the information wasn't available in osquery (https://github.com/facebook/osquery/issues/2907) but that is no longer the case. Let's add Windows detail queries to populate this information for Windows hosts.
1.0
Add windows network information to cards - Originally, we left off network information (IP address, MAC, etc) from host cards because the information wasn't available in osquery (https://github.com/facebook/osquery/issues/2907) but that is no longer the case. Let's add Windows detail queries to populate this information for Windows hosts.
non_priority
add windows network information to cards originally we left off network information ip address mac etc from host cards because the information wasn t available in osquery but that is no longer the case let s add windows detail queries to populate this information for windows hosts
0
7,804
7,042,661,818
IssuesEvent
2017-12-30 16:21:32
SimonKinds/4temps-tournament
https://api.github.com/repos/SimonKinds/4temps-tournament
closed
Create authorization middleware for express routes that checks if user is logged in
enhancement security
An example of how this can clean up code and make the code easier to read exists in `src/routes/tournament/index.js` Currently these routes have a block of code like this ```js if (req.session.user == null) { res.sendStatus(401); return; } ``` This code duplication is not only bad because of the duplication, but also error-prone. Instead a middleware should be selectively included in each route, which should block access to the route if the user is not logged in.
True
Create authorization middleware for express routes that checks if user is logged in - An example of how this can clean up code and make the code easier to read exists in `src/routes/tournament/index.js` Currently these routes have a block of code like this ```js if (req.session.user == null) { res.sendStatus(401); return; } ``` This code duplication is not only bad because of the duplication, but also error-prone. Instead a middleware should be selectively included in each route, which should block access to the route if the user is not logged in.
non_priority
create authorization middleware for express routes that checks if user is logged in an example of how this can clean up code and make the code easier to read exists in src routes tournament index js currently these routes have a block of code like this js if req session user null res sendstatus return this code duplication is not only bad because of the duplication but also error prone instead a middleware should be selectively included in each route which should block access to the route if the user is not logged in
0
25,180
6,628,593,661
IssuesEvent
2017-09-23 19:59:32
connected-web/gamebot
https://api.github.com/repos/connected-web/gamebot
closed
Add a command to view team mates
codenames suggestion
It would be nice if there was a command to remind who your team mates are - maybe something like 'who are my team?". Maybe the teams could be listed when calling 'game state' as well?
1.0
Add a command to view team mates - It would be nice if there was a command to remind who your team mates are - maybe something like 'who are my team?". Maybe the teams could be listed when calling 'game state' as well?
non_priority
add a command to view team mates it would be nice if there was a command to remind who your team mates are maybe something like who are my team maybe the teams could be listed when calling game state as well
0
55,311
30,685,799,736
IssuesEvent
2023-07-26 12:17:08
ArturGin/request_enforcer
https://api.github.com/repos/ArturGin/request_enforcer
opened
After adding gem, it takes a while to start the application
enhancement performance
It seems like Sniffer takes a while to load in
True
After adding gem, it takes a while to start the application - It seems like Sniffer takes a while to load in
non_priority
after adding gem it takes a while to start the application it seems like sniffer takes a while to load in
0
67,051
8,071,061,593
IssuesEvent
2018-08-06 11:57:17
PLUS-POSTECH/Owl
https://api.github.com/repos/PLUS-POSTECH/Owl
closed
Make owl-daemon DB aware of exploit test and dummy exploits
design new feature
사용 케이스 중에 익스플로잇이 제대로 작동하는지 실험해보는 부분이 있는데, 이를 고려해서 DB 내역을 수정할 필요가 있습니다. - [x] Fix migration schema - [x] Update schema.rs - [x] Update models.rs
1.0
Make owl-daemon DB aware of exploit test and dummy exploits - 사용 케이스 중에 익스플로잇이 제대로 작동하는지 실험해보는 부분이 있는데, 이를 고려해서 DB 내역을 수정할 필요가 있습니다. - [x] Fix migration schema - [x] Update schema.rs - [x] Update models.rs
non_priority
make owl daemon db aware of exploit test and dummy exploits 사용 케이스 중에 익스플로잇이 제대로 작동하는지 실험해보는 부분이 있는데 이를 고려해서 db 내역을 수정할 필요가 있습니다 fix migration schema update schema rs update models rs
0
12,210
9,597,377,952
IssuesEvent
2019-05-09 21:07:40
Azure/azure-sdk-for-net
https://api.github.com/repos/Azure/azure-sdk-for-net
closed
[Service Bus Client] Rename test environment variable
Client Service Bus
For consistency, @jsquire and I agreed to use the environment variable `SERVICE_BUS_CONNECTION_STRING` for all Service Bus tests in all languages. In this repo, the variable should be renamed from `AZ_SERVICE_BUS_CONNECTION` to `SERVICE_BUS_CONNECTION_STRING`. Related: https://github.com/Azure/azure-sdk-for-js/issues/2471
1.0
[Service Bus Client] Rename test environment variable - For consistency, @jsquire and I agreed to use the environment variable `SERVICE_BUS_CONNECTION_STRING` for all Service Bus tests in all languages. In this repo, the variable should be renamed from `AZ_SERVICE_BUS_CONNECTION` to `SERVICE_BUS_CONNECTION_STRING`. Related: https://github.com/Azure/azure-sdk-for-js/issues/2471
non_priority
rename test environment variable for consistency jsquire and i agreed to use the environment variable service bus connection string for all service bus tests in all languages in this repo the variable should be renamed from az service bus connection to service bus connection string related
0
104,508
11,412,577,257
IssuesEvent
2020-02-01 14:09:39
oscrud/oscrud
https://api.github.com/repos/oscrud/oscrud
closed
Transport
documentation
# Feature * Event-Driven * Lookup-able routing * Path-based routing # Integration * Go-HTTP * SocketIO * Echo # Example * Integration API * Example of Integration * Example of Registering Transport
1.0
Transport - # Feature * Event-Driven * Lookup-able routing * Path-based routing # Integration * Go-HTTP * SocketIO * Echo # Example * Integration API * Example of Integration * Example of Registering Transport
non_priority
transport feature event driven lookup able routing path based routing integration go http socketio echo example integration api example of integration example of registering transport
0
37,467
15,301,411,428
IssuesEvent
2021-02-24 13:35:14
wellcomecollection/platform
https://api.github.com/repos/wellcomecollection/platform
closed
Storage service shouldn't return a 500 error if you ask for a malformed external identifier
🐛 Bug 📦 Storage service
If you request external identifier `a.b` from the bags API, you get a 500 error. That's because it gets an IllegalArgumentException, thrown when you try to construct the ExternalIdentifier.
1.0
Storage service shouldn't return a 500 error if you ask for a malformed external identifier - If you request external identifier `a.b` from the bags API, you get a 500 error. That's because it gets an IllegalArgumentException, thrown when you try to construct the ExternalIdentifier.
non_priority
storage service shouldn t return a error if you ask for a malformed external identifier if you request external identifier a b from the bags api you get a error that s because it gets an illegalargumentexception thrown when you try to construct the externalidentifier
0
4,692
3,427,996,174
IssuesEvent
2015-12-10 06:31:45
angular/angular
https://api.github.com/repos/angular/angular
closed
flaky perf test on Firefox
comp: build/dev-productivity type: bug
This is currently the most common flake that I know of, can we disable the test on FF or do something else to prevent it from failing the builds several times a day? ``` Failures: 1) firefox extension should measure performance Message: Expected false to be truthy. Stack: Error: Failed expectation at assertEventsContainsName (benchpress/test/firefox_extension/spec.ts:13:17) at benchpress/test/firefox_extension/spec.ts:32:11 at Array.forEach (native) at process._tickCallback (node.js:366:9) 2 specs, 1 failure Finished in 132.347 seconds Shutting down selenium standalone server. [launcher] 0 instance(s) of WebDriver still running [launcher] firefox #1 failed 1 test(s) [launcher] overall: 1 failed spec(s) [launcher] Process exited with error code 1 +killServer +kill 3378 The command "./scripts/ci/build_and_test.sh ${MODE}" exited with 1. ```
1.0
flaky perf test on Firefox - This is currently the most common flake that I know of, can we disable the test on FF or do something else to prevent it from failing the builds several times a day? ``` Failures: 1) firefox extension should measure performance Message: Expected false to be truthy. Stack: Error: Failed expectation at assertEventsContainsName (benchpress/test/firefox_extension/spec.ts:13:17) at benchpress/test/firefox_extension/spec.ts:32:11 at Array.forEach (native) at process._tickCallback (node.js:366:9) 2 specs, 1 failure Finished in 132.347 seconds Shutting down selenium standalone server. [launcher] 0 instance(s) of WebDriver still running [launcher] firefox #1 failed 1 test(s) [launcher] overall: 1 failed spec(s) [launcher] Process exited with error code 1 +killServer +kill 3378 The command "./scripts/ci/build_and_test.sh ${MODE}" exited with 1. ```
non_priority
flaky perf test on firefox this is currently the most common flake that i know of can we disable the test on ff or do something else to prevent it from failing the builds several times a day failures firefox extension should measure performance message expected false to be truthy stack error failed expectation at asserteventscontainsname benchpress test firefox extension spec ts at benchpress test firefox extension spec ts at array foreach native at process tickcallback node js specs failure finished in seconds shutting down selenium standalone server instance s of webdriver still running firefox failed test s overall failed spec s process exited with error code killserver kill the command scripts ci build and test sh mode exited with
0
27,820
6,905,184,710
IssuesEvent
2017-11-27 05:25:21
cs340tabyu/cs340Fall2017
https://api.github.com/repos/cs340tabyu/cs340Fall2017
closed
Mismatch in player stats (train cars)
P3: Affects Gameplay Section 2 The Jedi Coders
![traincarsoff](https://user-images.githubusercontent.com/10781671/33091467-78256fae-ceb4-11e7-966f-bfcc93cae114.PNG) ![image](https://user-images.githubusercontent.com/10781671/33091485-83ee81ae-ceb4-11e7-8cf6-1e83a70ff941.png) Differing number displayed of Red Player TrainCars between two clients. Unsure of what the server has. Possibly related to Claimed Route Errors (subtracting trains even when route not claimed)
1.0
Mismatch in player stats (train cars) - ![traincarsoff](https://user-images.githubusercontent.com/10781671/33091467-78256fae-ceb4-11e7-966f-bfcc93cae114.PNG) ![image](https://user-images.githubusercontent.com/10781671/33091485-83ee81ae-ceb4-11e7-8cf6-1e83a70ff941.png) Differing number displayed of Red Player TrainCars between two clients. Unsure of what the server has. Possibly related to Claimed Route Errors (subtracting trains even when route not claimed)
non_priority
mismatch in player stats train cars differing number displayed of red player traincars between two clients unsure of what the server has possibly related to claimed route errors subtracting trains even when route not claimed
0
28,456
11,634,679,319
IssuesEvent
2020-02-28 10:51:01
solid/user-stories
https://api.github.com/repos/solid/user-stories
reopened
As a pod provider I'd like to see aggregated histories of access attempts to pods I host so that I can manage hotspots, charge per usage, prevent DoS attacks, etc.
Auditing Security
This may raise issues of privacy (e.g. for individual pod owners), but I think this needs to be balanced with the legitimate needs of the pod provider to effectively manage the infrastructure they provide for pod hosting (hence I mention in the title the possibly of the provider only having 'aggregated histories' of access, and perhaps not the level of detail that the individual pod owners may have). Perhaps a pod provider could offer differing levels of infrastructure support to pod owners based on the degree of visibility the pod owner consents to provide to the pod-hosting provider. #11
True
As a pod provider I'd like to see aggregated histories of access attempts to pods I host so that I can manage hotspots, charge per usage, prevent DoS attacks, etc. - This may raise issues of privacy (e.g. for individual pod owners), but I think this needs to be balanced with the legitimate needs of the pod provider to effectively manage the infrastructure they provide for pod hosting (hence I mention in the title the possibly of the provider only having 'aggregated histories' of access, and perhaps not the level of detail that the individual pod owners may have). Perhaps a pod provider could offer differing levels of infrastructure support to pod owners based on the degree of visibility the pod owner consents to provide to the pod-hosting provider. #11
non_priority
as a pod provider i d like to see aggregated histories of access attempts to pods i host so that i can manage hotspots charge per usage prevent dos attacks etc this may raise issues of privacy e g for individual pod owners but i think this needs to be balanced with the legitimate needs of the pod provider to effectively manage the infrastructure they provide for pod hosting hence i mention in the title the possibly of the provider only having aggregated histories of access and perhaps not the level of detail that the individual pod owners may have perhaps a pod provider could offer differing levels of infrastructure support to pod owners based on the degree of visibility the pod owner consents to provide to the pod hosting provider
0
107,798
16,762,314,727
IssuesEvent
2021-06-14 01:36:28
benlazarine/status-site
https://api.github.com/repos/benlazarine/status-site
opened
WS-2017-3772 (High) detected in underscore.string-3.2.3.tgz
security vulnerability
## WS-2017-3772 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>underscore.string-3.2.3.tgz</b></p></summary> <p>String manipulation extensions for Underscore.js javascript library.</p> <p>Library home page: <a href="https://registry.npmjs.org/underscore.string/-/underscore.string-3.2.3.tgz">https://registry.npmjs.org/underscore.string/-/underscore.string-3.2.3.tgz</a></p> <p>Path to dependency file: status-site/package.json</p> <p>Path to vulnerable library: status-site/node_modules/grunt-legacy-log/node_modules/underscore.string/package.json</p> <p> Dependency Hierarchy: - sails-0.12.14.tgz (Root Library) - grunt-1.0.1.tgz - grunt-legacy-util-1.0.0.tgz - :x: **underscore.string-3.2.3.tgz** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Regular Expression Denial of Service (ReDoS) vulnerability was found in underscore.string 2.4.0 through 3.3.5. <p>Publish Date: 2017-09-08 <p>URL: <a href=https://github.com/esamattis/underscore.string/issues/510>WS-2017-3772</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
WS-2017-3772 (High) detected in underscore.string-3.2.3.tgz - ## WS-2017-3772 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>underscore.string-3.2.3.tgz</b></p></summary> <p>String manipulation extensions for Underscore.js javascript library.</p> <p>Library home page: <a href="https://registry.npmjs.org/underscore.string/-/underscore.string-3.2.3.tgz">https://registry.npmjs.org/underscore.string/-/underscore.string-3.2.3.tgz</a></p> <p>Path to dependency file: status-site/package.json</p> <p>Path to vulnerable library: status-site/node_modules/grunt-legacy-log/node_modules/underscore.string/package.json</p> <p> Dependency Hierarchy: - sails-0.12.14.tgz (Root Library) - grunt-1.0.1.tgz - grunt-legacy-util-1.0.0.tgz - :x: **underscore.string-3.2.3.tgz** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Regular Expression Denial of Service (ReDoS) vulnerability was found in underscore.string 2.4.0 through 3.3.5. <p>Publish Date: 2017-09-08 <p>URL: <a href=https://github.com/esamattis/underscore.string/issues/510>WS-2017-3772</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
ws high detected in underscore string tgz ws high severity vulnerability vulnerable library underscore string tgz string manipulation extensions for underscore js javascript library library home page a href path to dependency file status site package json path to vulnerable library status site node modules grunt legacy log node modules underscore string package json dependency hierarchy sails tgz root library grunt tgz grunt legacy util tgz x underscore string tgz vulnerable library vulnerability details regular expression denial of service redos vulnerability was found in underscore string through publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href step up your open source security game with whitesource
0
117,027
15,039,041,262
IssuesEvent
2021-02-02 18:09:21
pekrau/notebooks
https://api.github.com/repos/pekrau/notebooks
closed
Should expansion of note tree display be remembered?
design question
Write into index.json file: "expanded" = [...]
1.0
Should expansion of note tree display be remembered? - Write into index.json file: "expanded" = [...]
non_priority
should expansion of note tree display be remembered write into index json file expanded
0
39,488
10,345,858,644
IssuesEvent
2019-09-04 14:15:16
haskell/haskell-ide-engine
https://api.github.com/repos/haskell/haskell-ide-engine
closed
Cannot do cabal 3.0 build for 8.6.5
build good first issue os: linux os: windows
Trying to install `cabal-hie-8.6.5` gives me the following error instead: ``` Warning: Failed to build documentation for haddock-api-2.22.0 (which is required by test:wrapper-test from haskell-ide-engine-0.9.0.0, test:unit-test from haskell-ide-engine-0.9.0.0 and others). # stack (for cabal-hie-8.6.5) # cabal (for cabal-hie-8.6.5) cabal: unrecognized 'new-install' option `--symlink-bindir=/home/annaia/.local/bin' Error when running Shake build system: at src/Development/Shake/Internal/Args.hs:81:69-79: * Depends on: cabal-hie-8.6.5 * Raised the exception: user error (Development.Shake.command_, system command failed Command: cabal new-install --write-ghc-environment-files=never --symlink-bindir=/home/annaia/.local/bin exe:hie --overwrite-policy=always Exit code: 1 Stderr: cabal: unrecognized 'new-install' option `--symlink-bindir=/home/annaia/.local/bin' ) ``` I have ghc-8.6.5 and cabal 3.0 installed locally so I'm presuming this is because somehow the stack temp cabal isn't the right version? Anyway to fix this or is there something I'm missing?
1.0
Cannot do cabal 3.0 build for 8.6.5 - Trying to install `cabal-hie-8.6.5` gives me the following error instead: ``` Warning: Failed to build documentation for haddock-api-2.22.0 (which is required by test:wrapper-test from haskell-ide-engine-0.9.0.0, test:unit-test from haskell-ide-engine-0.9.0.0 and others). # stack (for cabal-hie-8.6.5) # cabal (for cabal-hie-8.6.5) cabal: unrecognized 'new-install' option `--symlink-bindir=/home/annaia/.local/bin' Error when running Shake build system: at src/Development/Shake/Internal/Args.hs:81:69-79: * Depends on: cabal-hie-8.6.5 * Raised the exception: user error (Development.Shake.command_, system command failed Command: cabal new-install --write-ghc-environment-files=never --symlink-bindir=/home/annaia/.local/bin exe:hie --overwrite-policy=always Exit code: 1 Stderr: cabal: unrecognized 'new-install' option `--symlink-bindir=/home/annaia/.local/bin' ) ``` I have ghc-8.6.5 and cabal 3.0 installed locally so I'm presuming this is because somehow the stack temp cabal isn't the right version? Anyway to fix this or is there something I'm missing?
non_priority
cannot do cabal build for trying to install cabal hie gives me the following error instead warning failed to build documentation for haddock api which is required by test wrapper test from haskell ide engine test unit test from haskell ide engine and others stack for cabal hie cabal for cabal hie cabal unrecognized new install option symlink bindir home annaia local bin error when running shake build system at src development shake internal args hs depends on cabal hie raised the exception user error development shake command system command failed command cabal new install write ghc environment files never symlink bindir home annaia local bin exe hie overwrite policy always exit code stderr cabal unrecognized new install option symlink bindir home annaia local bin i have ghc and cabal installed locally so i m presuming this is because somehow the stack temp cabal isn t the right version anyway to fix this or is there something i m missing
0
92,314
18,820,429,126
IssuesEvent
2021-11-10 07:34:15
redhat-developer/vscode-openshift-tools
https://api.github.com/repos/redhat-developer/vscode-openshift-tools
closed
Provide filters for started/not started clusters
resolution/wontfix kind/feature upstream/vscode-k8s-tools
in my case, I have a lot of clusters registered, only one is started and I need to scroll to find it ![image](https://user-images.githubusercontent.com/1105127/48552499-08eb8480-e8d9-11e8-8a68-57a5dd0ace70.png) instead of filter it might also be 2 top-level tree nodes. nota having a marker to mention if it started or not would be nice too in case of filter (not useful if grouped in different node tree)
1.0
Provide filters for started/not started clusters - in my case, I have a lot of clusters registered, only one is started and I need to scroll to find it ![image](https://user-images.githubusercontent.com/1105127/48552499-08eb8480-e8d9-11e8-8a68-57a5dd0ace70.png) instead of filter it might also be 2 top-level tree nodes. nota having a marker to mention if it started or not would be nice too in case of filter (not useful if grouped in different node tree)
non_priority
provide filters for started not started clusters in my case i have a lot of clusters registered only one is started and i need to scroll to find it instead of filter it might also be top level tree nodes nota having a marker to mention if it started or not would be nice too in case of filter not useful if grouped in different node tree
0
9,237
3,869,861,936
IssuesEvent
2016-04-10 21:02:33
wevote/WebApp
https://api.github.com/repos/wevote/WebApp
closed
Mobile display too wide, iPhone Safari
code review
- [x] Many pages are too wide (and offer left/right scrolling) in an iPhone 6 in Safari. (Note: I think our minimum phone width should be iPhone 5) These include Ballot, Candidate, More Opinions - [x] "1 positive (up arrow)" and "0 negative (down arrow)" should fit on one line (See attached photos, for both ballot page and candidate page) - [x] We can reduce the candidate photo to ~66% of the current size when in mobile mode. ![mobile-ballot_too_wide](https://cloud.githubusercontent.com/assets/7756031/13753649/05927992-e9d1-11e5-828f-32c9f3c28ead.PNG) ![mobile-candidate_positive_negative](https://cloud.githubusercontent.com/assets/7756031/13753669/1ee7d9b4-e9d1-11e5-9dcb-05f1dc0a8c7e.PNG)
1.0
Mobile display too wide, iPhone Safari - - [x] Many pages are too wide (and offer left/right scrolling) in an iPhone 6 in Safari. (Note: I think our minimum phone width should be iPhone 5) These include Ballot, Candidate, More Opinions - [x] "1 positive (up arrow)" and "0 negative (down arrow)" should fit on one line (See attached photos, for both ballot page and candidate page) - [x] We can reduce the candidate photo to ~66% of the current size when in mobile mode. ![mobile-ballot_too_wide](https://cloud.githubusercontent.com/assets/7756031/13753649/05927992-e9d1-11e5-828f-32c9f3c28ead.PNG) ![mobile-candidate_positive_negative](https://cloud.githubusercontent.com/assets/7756031/13753669/1ee7d9b4-e9d1-11e5-9dcb-05f1dc0a8c7e.PNG)
non_priority
mobile display too wide iphone safari many pages are too wide and offer left right scrolling in an iphone in safari note i think our minimum phone width should be iphone these include ballot candidate more opinions positive up arrow and negative down arrow should fit on one line see attached photos for both ballot page and candidate page we can reduce the candidate photo to of the current size when in mobile mode
0
233,764
19,044,247,418
IssuesEvent
2021-11-25 04:37:47
systemd/systemd
https://api.github.com/repos/systemd/systemd
closed
Spurious fails in TEST-46-HOMED
bug 🐛 tests homed ci-blocker 🚧
**systemd version the issue has been seen with** > latest master <!-- **NOTE:** Do not submit bug reports about anything but the two most recently released *major* systemd versions upstream! --> <!-- If there have been multiple stable releases for that major version, please consider updating to a recent one before reporting an issue. --> <!-- When using a distro package, please make sure that the version reported is meaningful for upstream. --> <!-- See https://github.com/systemd/systemd-stable/releases for the list of most recent releases. --> <!-- For older version please use distribution trackers (see https://systemd.io/CONTRIBUTING#filing-issues). --> **Used distribution** > Arch Linux In several latest CentOS CI results I noticed an intermittent fail in TEST-46-HOMED: ``` [ 45.107852] testsuite-46.sh[246]: + diff -I '^\s*Disk \(Size\|Free\|Floor\|Ceiling\):' /tmp/a /tmp/b [ 45.108536] testsuite-46.sh[246]: + rm /tmp/a /tmp/b [ 45.111213] testsuite-46.sh[246]: + SYSTEMD_LOG_LEVEL=debug [ 45.111213] testsuite-46.sh[246]: + PASSWORD=yPN4N0fYNKUkOq [ 45.111213] testsuite-46.sh[246]: + NEWPASSWORD=xEhErW0ndafV4s [ 45.111213] testsuite-46.sh[246]: + homectl passwd test-user [ 45.118581] homectl[471]: Bus n/a: changing state UNSET → OPENING [ 45.119274] homectl[471]: sd-bus: starting bus by connecting to /run/dbus/system_bus_socket... [ 45.119401] homectl[471]: Bus n/a: changing state OPENING → AUTHENTICATING [ 45.120167] homectl[471]: Bus n/a: changing state AUTHENTICATING → HELLO [ 45.120278] homectl[471]: Sent message type=method_call sender=n/a destination=org.freedesktop.DBus path=/org/freedesktop/DBus interface=org.freedesktop.DBus member=Hello cookie=1 reply_cookie=0 signature=n/a error-name=n/a error-messa> [ 45.121201] homectl[471]: Got message type=method_return sender=org.freedesktop.DBus destination=:1.16 path=n/a interface=n/a member=n/a cookie=1 reply_cookie=1 signature=s error-name=n/a error-message=n/a [ 45.121329] homectl[471]: Bus n/a: changing state HELLO → RUNNING [ 45.121737] homectl[471]: Sent message type=method_call sender=n/a destination=org.freedesktop.home1 path=/org/freedesktop/home1 interface=org.freedesktop.home1.Manager member=ChangePasswordHome cookie=2 reply_cookie=0 signature=sss er> [ 45.235877] systemd-homed[223]: test-user: changing state active → passwd-while-active [ 46.396633] systemd-homework[472]: No valid password for LUKS superblock. [ 48.259199] systemd-homed[223]: Change operation failed: Required key not available [ 48.259619] systemd-homed[223]: test-user: changing state passwd-while-active → active [ 48.259818] homectl[471]: Got message type=error sender=:1.0 destination=:1.16 path=n/a interface=n/a member=n/a cookie=114 reply_cookie=2 signature=s error-name=org.freedesktop.home1.BadPassword error-message=Password for home test-us> [ 48.262588] homectl[471]: Sent message type=method_call sender=n/a destination=org.freedesktop.home1 path=/org/freedesktop/home1 interface=org.freedesktop.home1.Manager member=ChangePasswordHome cookie=3 reply_cookie=0 signature=sss er> [ 48.482874] systemd-homed[223]: test-user: changing state active → passwd-while-active [ 50.521386] systemd-homework[473]: Discovered used LUKS device /dev/mapper/home-test-user, and validated password. [ 50.640260] systemd-homework[473]: Successfully re-activated LUKS device. [ 50.735247] systemd-homework[473]: Provided password unlocks user record. [ 50.735633] systemd-homework[473]: Discovered used loopback device /dev/loop0. [ 50.735796] systemd-homework[473]: Failed to open .identity file in home directory: Permission denied [ 50.739144] systemd-homed[223]: Change operation failed: Permission denied [ 50.739691] systemd-homed[223]: test-user: changing state passwd-while-active → active [ 50.739796] homectl[471]: Got message type=error sender=:1.0 destination=:1.16 path=n/a interface=n/a member=n/a cookie=117 reply_cookie=3 signature=s error-name=org.freedesktop.DBus.Error.AccessDenied error-message=Failed to execute o> [ 50.740123] homectl[471]: Operation on home test-user failed: Access denied [ 50.740241] homectl[471]: Bus n/a: changing state RUNNING → CLOSED ``` Full journal: [system.journal.tar.gz](https://github.com/systemd/systemd/files/7569109/system.journal.tar.gz) /cc @poettering
1.0
Spurious fails in TEST-46-HOMED - **systemd version the issue has been seen with** > latest master <!-- **NOTE:** Do not submit bug reports about anything but the two most recently released *major* systemd versions upstream! --> <!-- If there have been multiple stable releases for that major version, please consider updating to a recent one before reporting an issue. --> <!-- When using a distro package, please make sure that the version reported is meaningful for upstream. --> <!-- See https://github.com/systemd/systemd-stable/releases for the list of most recent releases. --> <!-- For older version please use distribution trackers (see https://systemd.io/CONTRIBUTING#filing-issues). --> **Used distribution** > Arch Linux In several latest CentOS CI results I noticed an intermittent fail in TEST-46-HOMED: ``` [ 45.107852] testsuite-46.sh[246]: + diff -I '^\s*Disk \(Size\|Free\|Floor\|Ceiling\):' /tmp/a /tmp/b [ 45.108536] testsuite-46.sh[246]: + rm /tmp/a /tmp/b [ 45.111213] testsuite-46.sh[246]: + SYSTEMD_LOG_LEVEL=debug [ 45.111213] testsuite-46.sh[246]: + PASSWORD=yPN4N0fYNKUkOq [ 45.111213] testsuite-46.sh[246]: + NEWPASSWORD=xEhErW0ndafV4s [ 45.111213] testsuite-46.sh[246]: + homectl passwd test-user [ 45.118581] homectl[471]: Bus n/a: changing state UNSET → OPENING [ 45.119274] homectl[471]: sd-bus: starting bus by connecting to /run/dbus/system_bus_socket... [ 45.119401] homectl[471]: Bus n/a: changing state OPENING → AUTHENTICATING [ 45.120167] homectl[471]: Bus n/a: changing state AUTHENTICATING → HELLO [ 45.120278] homectl[471]: Sent message type=method_call sender=n/a destination=org.freedesktop.DBus path=/org/freedesktop/DBus interface=org.freedesktop.DBus member=Hello cookie=1 reply_cookie=0 signature=n/a error-name=n/a error-messa> [ 45.121201] homectl[471]: Got message type=method_return sender=org.freedesktop.DBus destination=:1.16 path=n/a interface=n/a member=n/a cookie=1 reply_cookie=1 signature=s error-name=n/a error-message=n/a [ 45.121329] homectl[471]: Bus n/a: changing state HELLO → RUNNING [ 45.121737] homectl[471]: Sent message type=method_call sender=n/a destination=org.freedesktop.home1 path=/org/freedesktop/home1 interface=org.freedesktop.home1.Manager member=ChangePasswordHome cookie=2 reply_cookie=0 signature=sss er> [ 45.235877] systemd-homed[223]: test-user: changing state active → passwd-while-active [ 46.396633] systemd-homework[472]: No valid password for LUKS superblock. [ 48.259199] systemd-homed[223]: Change operation failed: Required key not available [ 48.259619] systemd-homed[223]: test-user: changing state passwd-while-active → active [ 48.259818] homectl[471]: Got message type=error sender=:1.0 destination=:1.16 path=n/a interface=n/a member=n/a cookie=114 reply_cookie=2 signature=s error-name=org.freedesktop.home1.BadPassword error-message=Password for home test-us> [ 48.262588] homectl[471]: Sent message type=method_call sender=n/a destination=org.freedesktop.home1 path=/org/freedesktop/home1 interface=org.freedesktop.home1.Manager member=ChangePasswordHome cookie=3 reply_cookie=0 signature=sss er> [ 48.482874] systemd-homed[223]: test-user: changing state active → passwd-while-active [ 50.521386] systemd-homework[473]: Discovered used LUKS device /dev/mapper/home-test-user, and validated password. [ 50.640260] systemd-homework[473]: Successfully re-activated LUKS device. [ 50.735247] systemd-homework[473]: Provided password unlocks user record. [ 50.735633] systemd-homework[473]: Discovered used loopback device /dev/loop0. [ 50.735796] systemd-homework[473]: Failed to open .identity file in home directory: Permission denied [ 50.739144] systemd-homed[223]: Change operation failed: Permission denied [ 50.739691] systemd-homed[223]: test-user: changing state passwd-while-active → active [ 50.739796] homectl[471]: Got message type=error sender=:1.0 destination=:1.16 path=n/a interface=n/a member=n/a cookie=117 reply_cookie=3 signature=s error-name=org.freedesktop.DBus.Error.AccessDenied error-message=Failed to execute o> [ 50.740123] homectl[471]: Operation on home test-user failed: Access denied [ 50.740241] homectl[471]: Bus n/a: changing state RUNNING → CLOSED ``` Full journal: [system.journal.tar.gz](https://github.com/systemd/systemd/files/7569109/system.journal.tar.gz) /cc @poettering
non_priority
spurious fails in test homed systemd version the issue has been seen with latest master used distribution arch linux in several latest centos ci results i noticed an intermittent fail in test homed testsuite sh diff i s disk size free floor ceiling tmp a tmp b testsuite sh rm tmp a tmp b testsuite sh systemd log level debug testsuite sh password testsuite sh newpassword testsuite sh homectl passwd test user homectl bus n a changing state unset → opening homectl sd bus starting bus by connecting to run dbus system bus socket homectl bus n a changing state opening → authenticating homectl bus n a changing state authenticating → hello homectl sent message type method call sender n a destination org freedesktop dbus path org freedesktop dbus interface org freedesktop dbus member hello cookie reply cookie signature n a error name n a error messa homectl got message type method return sender org freedesktop dbus destination path n a interface n a member n a cookie reply cookie signature s error name n a error message n a homectl bus n a changing state hello → running homectl sent message type method call sender n a destination org freedesktop path org freedesktop interface org freedesktop manager member changepasswordhome cookie reply cookie signature sss er systemd homed test user changing state active → passwd while active systemd homework no valid password for luks superblock systemd homed change operation failed required key not available systemd homed test user changing state passwd while active → active homectl got message type error sender destination path n a interface n a member n a cookie reply cookie signature s error name org freedesktop badpassword error message password for home test us homectl sent message type method call sender n a destination org freedesktop path org freedesktop interface org freedesktop manager member changepasswordhome cookie reply cookie signature sss er systemd homed test user changing state active → passwd while active systemd homework discovered used luks device dev mapper home test user and validated password systemd homework successfully re activated luks device systemd homework provided password unlocks user record systemd homework discovered used loopback device dev systemd homework failed to open identity file in home directory permission denied systemd homed change operation failed permission denied systemd homed test user changing state passwd while active → active homectl got message type error sender destination path n a interface n a member n a cookie reply cookie signature s error name org freedesktop dbus error accessdenied error message failed to execute o homectl operation on home test user failed access denied homectl bus n a changing state running → closed full journal cc poettering
0
65,548
12,619,533,483
IssuesEvent
2020-06-13 01:04:59
asartalo/ctse
https://api.github.com/repos/asartalo/ctse
closed
Fix "method_lines" issue in lib/Session.js
code-quality
Function `_objectify` has 31 lines of code (exceeds 25 allowed). Consider refactoring. https://codeclimate.com/github/asartalo/ctse/lib/Session.js#issue_5ee2aaef02a4580001000046
1.0
Fix "method_lines" issue in lib/Session.js - Function `_objectify` has 31 lines of code (exceeds 25 allowed). Consider refactoring. https://codeclimate.com/github/asartalo/ctse/lib/Session.js#issue_5ee2aaef02a4580001000046
non_priority
fix method lines issue in lib session js function objectify has lines of code exceeds allowed consider refactoring
0
76,804
9,965,830,825
IssuesEvent
2019-07-08 09:40:22
tidyverse/dplyr
https://api.github.com/repos/tidyverse/dplyr
closed
Documentation of NA types (NA_real_, etc.) in recode function
documentation help wanted :heart: tidy-dev-day :nerd_face:
I was reading issue #3202, which relates to the need to use the correct type of NA on the RHS of the case_when function (i.e. NA_real_, NA_character_) etc. The author indicated that they have never heard of different types of NA and I hadn't either. They opened a PR to add an example to the documentation. I think I'm observing the same type of issue with recode and I wondered if you would like me to open a PR for the documentation for that, too? NA_character_ appears once in the current documentation but it doesn't really say anything specific about matching up the types. Just thought it would be a bit clearer for people like me. ``` r library(dplyr) #> #> Attaching package: 'dplyr' #> The following objects are masked from 'package:stats': #> #> filter, lag #> The following objects are masked from 'package:base': #> #> intersect, setdiff, setequal, union starwars %>% select(name:mass, gender, species) %>% mutate( gender = recode(gender, "male" = 1, "female" = 2, .default = NA) ) #> Error in mutate_impl(.data, dots): Evaluation error: `.default` must be type double, not logical. ``` Created on 2018-08-23 by the [reprex package](http://reprex.tidyverse.org) (v0.2.0).
1.0
Documentation of NA types (NA_real_, etc.) in recode function - I was reading issue #3202, which relates to the need to use the correct type of NA on the RHS of the case_when function (i.e. NA_real_, NA_character_) etc. The author indicated that they have never heard of different types of NA and I hadn't either. They opened a PR to add an example to the documentation. I think I'm observing the same type of issue with recode and I wondered if you would like me to open a PR for the documentation for that, too? NA_character_ appears once in the current documentation but it doesn't really say anything specific about matching up the types. Just thought it would be a bit clearer for people like me. ``` r library(dplyr) #> #> Attaching package: 'dplyr' #> The following objects are masked from 'package:stats': #> #> filter, lag #> The following objects are masked from 'package:base': #> #> intersect, setdiff, setequal, union starwars %>% select(name:mass, gender, species) %>% mutate( gender = recode(gender, "male" = 1, "female" = 2, .default = NA) ) #> Error in mutate_impl(.data, dots): Evaluation error: `.default` must be type double, not logical. ``` Created on 2018-08-23 by the [reprex package](http://reprex.tidyverse.org) (v0.2.0).
non_priority
documentation of na types na real etc in recode function i was reading issue which relates to the need to use the correct type of na on the rhs of the case when function i e na real na character etc the author indicated that they have never heard of different types of na and i hadn t either they opened a pr to add an example to the documentation i think i m observing the same type of issue with recode and i wondered if you would like me to open a pr for the documentation for that too na character appears once in the current documentation but it doesn t really say anything specific about matching up the types just thought it would be a bit clearer for people like me r library dplyr attaching package dplyr the following objects are masked from package stats filter lag the following objects are masked from package base intersect setdiff setequal union starwars select name mass gender species mutate gender recode gender male female default na error in mutate impl data dots evaluation error default must be type double not logical created on by the
0
26,748
4,241,331,102
IssuesEvent
2016-07-06 16:00:14
Shopify/sarama
https://api.github.com/repos/Shopify/sarama
closed
Check the received message value in producer mocks
enhancement producer tests
Hi guys, not sure if this is a valid issue. When developing a unit test for a program that uses the sync/asyc producer, I can only say that I expect to receive a message and that I want the mock response to be success/error. For my test I need to check the value inside the message, so I propose to extend the `producerExpectation struct` in mocks.go and to add new methods to the producer mock, that receive in input a string (regexp) and check the received value against this regexp. I am ok to propose an implementation if it makes sense.
1.0
Check the received message value in producer mocks - Hi guys, not sure if this is a valid issue. When developing a unit test for a program that uses the sync/asyc producer, I can only say that I expect to receive a message and that I want the mock response to be success/error. For my test I need to check the value inside the message, so I propose to extend the `producerExpectation struct` in mocks.go and to add new methods to the producer mock, that receive in input a string (regexp) and check the received value against this regexp. I am ok to propose an implementation if it makes sense.
non_priority
check the received message value in producer mocks hi guys not sure if this is a valid issue when developing a unit test for a program that uses the sync asyc producer i can only say that i expect to receive a message and that i want the mock response to be success error for my test i need to check the value inside the message so i propose to extend the producerexpectation struct in mocks go and to add new methods to the producer mock that receive in input a string regexp and check the received value against this regexp i am ok to propose an implementation if it makes sense
0
166,538
26,371,046,675
IssuesEvent
2023-01-11 20:42:49
elementor/elementor
https://api.github.com/repos/elementor/elementor
closed
✔️ 🔗 🚀 Feature Request: A more flexible section with auto-width columns (Related to #2219)
request/enhancement type/responsive component/layout component/design solved_by_container 🚀 shipped solved_by_custom_units
<!-- Before opening a new issue, please search for duplicate issues to prevent opening a duplicate feature request. If there is already an open existing request, please leave a comment there. --> ## Prerequisites <!-- MARK COMPLETED ITEMS WITH AN [x] --> - [x] I have searched for similar features requests in both open and closed tickets and cannot find a duplicate. - [x] The feature is still missing in the latest stable version of Elementor ( Elementor Pro. ) **What problem is your feature request going to solve? Please describe.** **My request** Option to make a section more flexible where the columns take no more space than they require instead of fixed percentage **The issue** Let's say you full width section with 3 columns, in this case a header. The structure is [LOGO] [MENU------------------] [LOGIN] So you add a section with 3 columns, and you can set their percentages, let's say 20% 60%, 20%; Within the logo column, I add the logo image however I don't want to set the image to have percentage width as it may be too big on some screens and too small on others. I want a fixed logo image width. But if I do so, the logo image will (most of the time) be smaller or bigger than the logo column depending on screen width. If it's smaller, that creates empty space between the logo and the menu [LOGO**/////**] [MENU------------------] [LOGIN] **Describe the solution you'd like** The solution I propose is, add an option to each section which when enabled sets each child column to width: auto; ``` .elementor-row > .elementor-column { width: auto; } ``` Add an additional option to control the behaviour of the columns with flexbox e.g center, left, right, space-between, space-around. ``` .elementor-row { justify-content: space-between; /*center, left, right, space-between, space-around.*/ } ``` You could also add flex-grow option for each column
1.0
✔️ 🔗 🚀 Feature Request: A more flexible section with auto-width columns (Related to #2219) - <!-- Before opening a new issue, please search for duplicate issues to prevent opening a duplicate feature request. If there is already an open existing request, please leave a comment there. --> ## Prerequisites <!-- MARK COMPLETED ITEMS WITH AN [x] --> - [x] I have searched for similar features requests in both open and closed tickets and cannot find a duplicate. - [x] The feature is still missing in the latest stable version of Elementor ( Elementor Pro. ) **What problem is your feature request going to solve? Please describe.** **My request** Option to make a section more flexible where the columns take no more space than they require instead of fixed percentage **The issue** Let's say you full width section with 3 columns, in this case a header. The structure is [LOGO] [MENU------------------] [LOGIN] So you add a section with 3 columns, and you can set their percentages, let's say 20% 60%, 20%; Within the logo column, I add the logo image however I don't want to set the image to have percentage width as it may be too big on some screens and too small on others. I want a fixed logo image width. But if I do so, the logo image will (most of the time) be smaller or bigger than the logo column depending on screen width. If it's smaller, that creates empty space between the logo and the menu [LOGO**/////**] [MENU------------------] [LOGIN] **Describe the solution you'd like** The solution I propose is, add an option to each section which when enabled sets each child column to width: auto; ``` .elementor-row > .elementor-column { width: auto; } ``` Add an additional option to control the behaviour of the columns with flexbox e.g center, left, right, space-between, space-around. ``` .elementor-row { justify-content: space-between; /*center, left, right, space-between, space-around.*/ } ``` You could also add flex-grow option for each column
non_priority
✔️ 🔗 🚀 feature request a more flexible section with auto width columns related to prerequisites i have searched for similar features requests in both open and closed tickets and cannot find a duplicate the feature is still missing in the latest stable version of elementor elementor pro what problem is your feature request going to solve please describe my request option to make a section more flexible where the columns take no more space than they require instead of fixed percentage the issue let s say you full width section with columns in this case a header the structure is so you add a section with columns and you can set their percentages let s say within the logo column i add the logo image however i don t want to set the image to have percentage width as it may be too big on some screens and too small on others i want a fixed logo image width but if i do so the logo image will most of the time be smaller or bigger than the logo column depending on screen width if it s smaller that creates empty space between the logo and the menu describe the solution you d like the solution i propose is add an option to each section which when enabled sets each child column to width auto elementor row elementor column width auto add an additional option to control the behaviour of the columns with flexbox e g center left right space between space around elementor row justify content space between center left right space between space around you could also add flex grow option for each column
0
12,197
4,386,539,829
IssuesEvent
2016-08-08 13:11:35
ColinGilbert/noobwerkz-engine
https://api.github.com/repos/ColinGilbert/noobwerkz-engine
closed
Banish -fpermissive
best practices bug code correctness perpetual security stability
Having this thing is useful in a pinch, but a horror in production code that allows certain awful things right through.
1.0
Banish -fpermissive - Having this thing is useful in a pinch, but a horror in production code that allows certain awful things right through.
non_priority
banish fpermissive having this thing is useful in a pinch but a horror in production code that allows certain awful things right through
0
6,276
3,006,833,090
IssuesEvent
2015-07-27 13:09:48
centresource/generator-playbook
https://api.github.com/repos/centresource/generator-playbook
closed
Add upgrade instructions?
documentation question
Should we consider adding some documentation on how to upgrade an existing project from v1 to v2? Maybe the wiki is a good place for this.
1.0
Add upgrade instructions? - Should we consider adding some documentation on how to upgrade an existing project from v1 to v2? Maybe the wiki is a good place for this.
non_priority
add upgrade instructions should we consider adding some documentation on how to upgrade an existing project from to maybe the wiki is a good place for this
0
18,311
6,574,378,138
IssuesEvent
2017-09-11 12:40:08
pioneerspacesim/pioneer
https://api.github.com/repos/pioneerspacesim/pioneer
closed
macOS build failure due to ARFLAGS
Build Platform Specific
``` Making install in miniz make[3]: Nothing to be done for `install-exec-am'. make[3]: Nothing to be done for `install-data-am'. Making install in jenkins CC lookup3.o AR libjenkins.a /Applications/Xcode.app/Contents/Developer/Toolchains/XcodeDefault.xctoolchain/usr/bin/ar: illegal option -- j usage: ar -d [-TLsv] archive file ... ar -m [-TLsv] archive file ... ar -m [-abiTLsv] position archive file ... ar -p [-TLsv] archive [file ...] ar -q [-cTLsv] archive file ... ar -r [-cuTLsv] archive file ... ar -r [-abciuTLsv] position archive file ... ar -t [-TLsv] archive [file ...] ar -x [-ouTLsv] archive [file ...] make[2]: *** [libjenkins.a] Error 1 make[1]: *** [install-recursive] Error 1 make: *** [install-recursive] Error 1 ``` This is what happens if I remove ``` ENV["ARFLAGS"] = "cru" ``` from the Homebrew formula. The comment in the formula says: ``` # Remove as soon as possible # https://github.com/pioneerspacesim/pioneer/issues/3839 ``` But https://github.com/pioneerspacesim/pioneer/issues/3839 is apparently closed (via https://github.com/pioneerspacesim/pioneer/pull/3987) and yet the problem remains. https://jenkins.brew.sh/job/Homebrew%20Core%20Pull%20Requests/6489/version=sierra/console
1.0
macOS build failure due to ARFLAGS - ``` Making install in miniz make[3]: Nothing to be done for `install-exec-am'. make[3]: Nothing to be done for `install-data-am'. Making install in jenkins CC lookup3.o AR libjenkins.a /Applications/Xcode.app/Contents/Developer/Toolchains/XcodeDefault.xctoolchain/usr/bin/ar: illegal option -- j usage: ar -d [-TLsv] archive file ... ar -m [-TLsv] archive file ... ar -m [-abiTLsv] position archive file ... ar -p [-TLsv] archive [file ...] ar -q [-cTLsv] archive file ... ar -r [-cuTLsv] archive file ... ar -r [-abciuTLsv] position archive file ... ar -t [-TLsv] archive [file ...] ar -x [-ouTLsv] archive [file ...] make[2]: *** [libjenkins.a] Error 1 make[1]: *** [install-recursive] Error 1 make: *** [install-recursive] Error 1 ``` This is what happens if I remove ``` ENV["ARFLAGS"] = "cru" ``` from the Homebrew formula. The comment in the formula says: ``` # Remove as soon as possible # https://github.com/pioneerspacesim/pioneer/issues/3839 ``` But https://github.com/pioneerspacesim/pioneer/issues/3839 is apparently closed (via https://github.com/pioneerspacesim/pioneer/pull/3987) and yet the problem remains. https://jenkins.brew.sh/job/Homebrew%20Core%20Pull%20Requests/6489/version=sierra/console
non_priority
macos build failure due to arflags making install in miniz make nothing to be done for install exec am make nothing to be done for install data am making install in jenkins cc o ar libjenkins a applications xcode app contents developer toolchains xcodedefault xctoolchain usr bin ar illegal option j usage ar d archive file ar m archive file ar m position archive file ar p archive ar q archive file ar r archive file ar r position archive file ar t archive ar x archive make error make error make error this is what happens if i remove env cru from the homebrew formula the comment in the formula says remove as soon as possible but is apparently closed via and yet the problem remains
0
105,381
9,081,711,324
IssuesEvent
2019-02-17 04:31:36
phan/phan
https://api.github.com/repos/phan/phan
closed
"Serialization of 'Closure' is not allowed" exception running unit tests of Phan
tests
Noticed when fixing phpunit xml configurations. Recording this because Phan frequently uses static closures for performance reasons and some fail to be added to the test cases' ` protected $backupStaticAttributesBlacklist` This was due to the $closure_map (src/Phan/AST/ASTReverter.php on line 71) Steps used to track down which closure was the cause: ``` # install a build of PHP with debugging symbols (i.e. configured with `CFLAGS=-g`) and use that » gdb -args `which php` vendor/bin/phpunit ... (gdb) b zend_class_serialize_deny Breakpoint 1 at 0x9fa880 ... (gdb) run Starting program: /path/to/php-7.3.1-dev-nts-install/bin/php vendor/bin/phpunit [Thread debugging using libthread_db enabled] Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1". PHPUnit 6.5.14 by Sebastian Bergmann and contributors. ............................................................. 61 / 1315 ( 4%) ............................................................. 122 / 1315 ( 9%) ............................................................. 183 / 1315 ( 13%) ............................................................. 244 / 1315 ( 18%) ............................................................. 305 / 1315 ( 23%) ............................................................. 366 / 1315 ( 27%) ............................................................. 427 / 1315 ( 32%) ............................................................. 488 / 1315 ( 37%) ............................................................. 549 / 1315 ( 41%) ............................................................. 610 / 1315 ( 46%) ............................................................. 671 / 1315 ( 51%) ............................................................. 732 / 1315 ( 55%) ............................................................. 793 / 1315 ( 60%) ............................................................. 854 / 1315 ( 64%) ............................................................. 915 / 1315 ( 69%) ............................................................. 976 / 1315 ( 74%) ............................................................. 1037 / 1315 ( 78%) ............................................................. 1098 / 1315 ( 83%) ............................................SSSSSSSSSSSSSSSSS 1159 / 1315 ( 88%) SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS........ 1220 / 1315 ( 92%) ............................................................. 1281 / 1315 ( 97%) ..................... Breakpoint 1, 0x00000000009fa880 in zend_class_serialize_deny () (gdb) bt #0 0x00000000009fa880 in zend_class_serialize_deny () #1 0x00000000008f4e6d in php_var_serialize_intern.part () #2 0x00000000008f5695 in php_var_serialize_intern.part () #3 0x00000000008f96b8 in php_var_serialize () #4 0x00000000008f9815 in zif_serialize () #5 0x0000000000a74bff in execute_ex () #6 0x0000000000a7f8d6 in zend_execute () #7 0x00000000009dbc30 in zend_execute_scripts () #8 0x0000000000970938 in php_execute_script () #9 0x0000000000a824f9 in do_cli () #10 0x000000000045f56c in main () (gdb) set $func = ((zend_closure*)object->value.obj)->func (gdb) print (char*) ($func->op_array.filename)->val $1 = 0x7fffe916f818 "/path/to/phan/src/Phan/AST/ASTReverter.php" (gdb) print $func->op_array.line_start $2 = 71 ```
1.0
"Serialization of 'Closure' is not allowed" exception running unit tests of Phan - Noticed when fixing phpunit xml configurations. Recording this because Phan frequently uses static closures for performance reasons and some fail to be added to the test cases' ` protected $backupStaticAttributesBlacklist` This was due to the $closure_map (src/Phan/AST/ASTReverter.php on line 71) Steps used to track down which closure was the cause: ``` # install a build of PHP with debugging symbols (i.e. configured with `CFLAGS=-g`) and use that » gdb -args `which php` vendor/bin/phpunit ... (gdb) b zend_class_serialize_deny Breakpoint 1 at 0x9fa880 ... (gdb) run Starting program: /path/to/php-7.3.1-dev-nts-install/bin/php vendor/bin/phpunit [Thread debugging using libthread_db enabled] Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1". PHPUnit 6.5.14 by Sebastian Bergmann and contributors. ............................................................. 61 / 1315 ( 4%) ............................................................. 122 / 1315 ( 9%) ............................................................. 183 / 1315 ( 13%) ............................................................. 244 / 1315 ( 18%) ............................................................. 305 / 1315 ( 23%) ............................................................. 366 / 1315 ( 27%) ............................................................. 427 / 1315 ( 32%) ............................................................. 488 / 1315 ( 37%) ............................................................. 549 / 1315 ( 41%) ............................................................. 610 / 1315 ( 46%) ............................................................. 671 / 1315 ( 51%) ............................................................. 732 / 1315 ( 55%) ............................................................. 793 / 1315 ( 60%) ............................................................. 854 / 1315 ( 64%) ............................................................. 915 / 1315 ( 69%) ............................................................. 976 / 1315 ( 74%) ............................................................. 1037 / 1315 ( 78%) ............................................................. 1098 / 1315 ( 83%) ............................................SSSSSSSSSSSSSSSSS 1159 / 1315 ( 88%) SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS........ 1220 / 1315 ( 92%) ............................................................. 1281 / 1315 ( 97%) ..................... Breakpoint 1, 0x00000000009fa880 in zend_class_serialize_deny () (gdb) bt #0 0x00000000009fa880 in zend_class_serialize_deny () #1 0x00000000008f4e6d in php_var_serialize_intern.part () #2 0x00000000008f5695 in php_var_serialize_intern.part () #3 0x00000000008f96b8 in php_var_serialize () #4 0x00000000008f9815 in zif_serialize () #5 0x0000000000a74bff in execute_ex () #6 0x0000000000a7f8d6 in zend_execute () #7 0x00000000009dbc30 in zend_execute_scripts () #8 0x0000000000970938 in php_execute_script () #9 0x0000000000a824f9 in do_cli () #10 0x000000000045f56c in main () (gdb) set $func = ((zend_closure*)object->value.obj)->func (gdb) print (char*) ($func->op_array.filename)->val $1 = 0x7fffe916f818 "/path/to/phan/src/Phan/AST/ASTReverter.php" (gdb) print $func->op_array.line_start $2 = 71 ```
non_priority
serialization of closure is not allowed exception running unit tests of phan noticed when fixing phpunit xml configurations recording this because phan frequently uses static closures for performance reasons and some fail to be added to the test cases protected backupstaticattributesblacklist this was due to the closure map src phan ast astreverter php on line steps used to track down which closure was the cause install a build of php with debugging symbols i e configured with cflags g and use that » gdb args which php vendor bin phpunit gdb b zend class serialize deny breakpoint at gdb run starting program path to php dev nts install bin php vendor bin phpunit using host libthread db library lib linux gnu libthread db so phpunit by sebastian bergmann and contributors sssssssssssssssss sssssssssssssssssssssssssssssssssssssssssssssssssssss breakpoint in zend class serialize deny gdb bt in zend class serialize deny in php var serialize intern part in php var serialize intern part in php var serialize in zif serialize in execute ex in zend execute in zend execute scripts in php execute script in do cli in main gdb set func zend closure object value obj func gdb print char func op array filename val path to phan src phan ast astreverter php gdb print func op array line start
0
146,622
11,741,863,624
IssuesEvent
2020-03-11 22:52:36
rancher/rancher
https://api.github.com/repos/rancher/rancher
closed
[k3s-upgrade] Workload-apply-k3s-worker-plan stuck while upgrading cluster from v1.16.3 to v1.16.7.
[zube]: To Test area/import-k3s kind/bug-qa
<!-- Please search for existing issues first, then read https://rancher.com/docs/rancher/v2.x/en/contributing/#bugs-issues-or-questions to see what we expect in an issue For security issues, please email security@rancher.com instead of posting a public issue in GitHub. You may (but are not required to) use the GPG key located on Keybase. --> **What kind of request is this (question/bug/enhancement/feature request):** Bug **Steps to reproduce (least amount of steps as possible):** 1. Import a k3s cluster with version v1.16.3 (1 master node, 2 worker nodes) 2. Upgrade the cluster to v1.16.7 (Drain server/worker node being false and concurrency being 1) **Result:** Cluster -> system -> Workload -> apply-k3s-worker-plan one of the pods is stuck in initialization state. <img width="924" alt="Screen Shot 2020-03-09 at 11 01 58 AM" src="https://user-images.githubusercontent.com/60111667/76247417-c1d78000-61fc-11ea-9ad8-e566fec43647.png"> <img width="1023" alt="Screen Shot 2020-03-09 at 11 10 05 AM" src="https://user-images.githubusercontent.com/60111667/76247773-504c0180-61fd-11ea-8b53-bc5fae38441c.png"> **Other details that may be helpful:** **Environment information** - Rancher version (`rancher/rancher`/`rancher/server` image tag or shown bottom left in the UI): master-2399-head - 926997017 - Installation option (single install/HA): Single
1.0
[k3s-upgrade] Workload-apply-k3s-worker-plan stuck while upgrading cluster from v1.16.3 to v1.16.7. - <!-- Please search for existing issues first, then read https://rancher.com/docs/rancher/v2.x/en/contributing/#bugs-issues-or-questions to see what we expect in an issue For security issues, please email security@rancher.com instead of posting a public issue in GitHub. You may (but are not required to) use the GPG key located on Keybase. --> **What kind of request is this (question/bug/enhancement/feature request):** Bug **Steps to reproduce (least amount of steps as possible):** 1. Import a k3s cluster with version v1.16.3 (1 master node, 2 worker nodes) 2. Upgrade the cluster to v1.16.7 (Drain server/worker node being false and concurrency being 1) **Result:** Cluster -> system -> Workload -> apply-k3s-worker-plan one of the pods is stuck in initialization state. <img width="924" alt="Screen Shot 2020-03-09 at 11 01 58 AM" src="https://user-images.githubusercontent.com/60111667/76247417-c1d78000-61fc-11ea-9ad8-e566fec43647.png"> <img width="1023" alt="Screen Shot 2020-03-09 at 11 10 05 AM" src="https://user-images.githubusercontent.com/60111667/76247773-504c0180-61fd-11ea-8b53-bc5fae38441c.png"> **Other details that may be helpful:** **Environment information** - Rancher version (`rancher/rancher`/`rancher/server` image tag or shown bottom left in the UI): master-2399-head - 926997017 - Installation option (single install/HA): Single
non_priority
workload apply worker plan stuck while upgrading cluster from to please search for existing issues first then read to see what we expect in an issue for security issues please email security rancher com instead of posting a public issue in github you may but are not required to use the gpg key located on keybase what kind of request is this question bug enhancement feature request bug steps to reproduce least amount of steps as possible import a cluster with version master node worker nodes upgrade the cluster to drain server worker node being false and concurrency being result cluster system workload apply worker plan one of the pods is stuck in initialization state img width alt screen shot at am src img width alt screen shot at am src other details that may be helpful environment information rancher version rancher rancher rancher server image tag or shown bottom left in the ui master head installation option single install ha single
0
104,103
16,613,422,334
IssuesEvent
2021-06-02 14:07:25
Thanraj/linux-4.1.15
https://api.github.com/repos/Thanraj/linux-4.1.15
opened
CVE-2017-18079 (High) detected in linux-stable-rtv4.1.33
security vulnerability
## CVE-2017-18079 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-stable-rtv4.1.33</b></p></summary> <p> <p>Julia Cartwright's fork of linux-stable-rt.git</p> <p>Library home page: <a href=https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git>https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git</a></p> <p>Found in HEAD commit: <a href="https://api.github.com/repos/Thanraj/linux-4.1.15/commits/5e3fb3e332499e1ad10a0969e55582af1027b085">5e3fb3e332499e1ad10a0969e55582af1027b085</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>linux-4.1.15/drivers/input/serio/i8042.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>linux-4.1.15/drivers/input/serio/i8042.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> drivers/input/serio/i8042.c in the Linux kernel before 4.12.4 allows attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact because the port->exists value can change after it is validated. <p>Publish Date: 2018-01-29 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-18079>CVE-2017-18079</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2017-18079">https://nvd.nist.gov/vuln/detail/CVE-2017-18079</a></p> <p>Release Date: 2018-01-29</p> <p>Fix Resolution: 4.12.4</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2017-18079 (High) detected in linux-stable-rtv4.1.33 - ## CVE-2017-18079 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-stable-rtv4.1.33</b></p></summary> <p> <p>Julia Cartwright's fork of linux-stable-rt.git</p> <p>Library home page: <a href=https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git>https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git</a></p> <p>Found in HEAD commit: <a href="https://api.github.com/repos/Thanraj/linux-4.1.15/commits/5e3fb3e332499e1ad10a0969e55582af1027b085">5e3fb3e332499e1ad10a0969e55582af1027b085</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>linux-4.1.15/drivers/input/serio/i8042.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>linux-4.1.15/drivers/input/serio/i8042.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> drivers/input/serio/i8042.c in the Linux kernel before 4.12.4 allows attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact because the port->exists value can change after it is validated. <p>Publish Date: 2018-01-29 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-18079>CVE-2017-18079</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2017-18079">https://nvd.nist.gov/vuln/detail/CVE-2017-18079</a></p> <p>Release Date: 2018-01-29</p> <p>Fix Resolution: 4.12.4</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in linux stable cve high severity vulnerability vulnerable library linux stable julia cartwright s fork of linux stable rt git library home page a href found in head commit a href found in base branch master vulnerable source files linux drivers input serio c linux drivers input serio c vulnerability details drivers input serio c in the linux kernel before allows attackers to cause a denial of service null pointer dereference and system crash or possibly have unspecified other impact because the port exists value can change after it is validated publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
13,562
16,081,114,093
IssuesEvent
2021-04-26 04:50:12
WordPress/gutenberg
https://api.github.com/repos/WordPress/gutenberg
opened
Disabling block widgets via theme supports wipes out content
Backwards Compatibility [Feature] Widgets Customizer [Feature] Widgets Screen [Package] Edit Widgets [Type] Bug
<!-- Please fill out ALL required sections. Bug reports with missing information will be closed. Before submitting a bug report: - Check if the bug has already been fixed by updating WordPress and/or Gutenberg. - Check if the bug is caused by a plugin by deactivating all plugins except Gutenberg. - Check if the bug is caused by a theme by activating a default theme e.g. Twenty Twenty. - Check if the bug has already been reported by searching https://github.com/WordPress/gutenberg/issues. If this is a security issue, please report it in HackerOne instead: https://hackerone.com/wordpress --> ## Description When adding `remove_theme_support( 'widgets-block-editor' );` to TT1's `functions.php` after using the block editor to add some blocks to widget areas, all content is lost and I cannot see the blocks I added. Optin back in, by removing the opt out code does _not_ bring back the content. ## Step-by-step reproduction instructions 1. Have Gutenberg `trunk` 2. Change your theme to TwentyTwentyOne 3. Go to Appearance > Widgets 4. Add some blocks (eg a heading and an image) 5. Save 5. Go to Appearance > Customizer 6. Add another block 7. Publish 8. Check the blocks you added appear in the theme's footer sidebar 9. Go to Appearance > Theme editor 10. Edit the theme's `functions.php` file 11. At the end of `twenty_twenty_one_setup` add `remove_theme_support( 'widgets-block-editor' );`; 12. Save 13. Go to Dashboard 14. Go to Appearance > Widgets 15. Notice the classic screens shows up 16. **No block in the the footer sidebar** ## Expected behaviour I expect all content remains no matter how many times I switch between optin in and opting out. ## Actual behaviour Content (blocks and legacy widgets) is lost when opting out of the `widgets-block-editor` supprt.
True
Disabling block widgets via theme supports wipes out content - <!-- Please fill out ALL required sections. Bug reports with missing information will be closed. Before submitting a bug report: - Check if the bug has already been fixed by updating WordPress and/or Gutenberg. - Check if the bug is caused by a plugin by deactivating all plugins except Gutenberg. - Check if the bug is caused by a theme by activating a default theme e.g. Twenty Twenty. - Check if the bug has already been reported by searching https://github.com/WordPress/gutenberg/issues. If this is a security issue, please report it in HackerOne instead: https://hackerone.com/wordpress --> ## Description When adding `remove_theme_support( 'widgets-block-editor' );` to TT1's `functions.php` after using the block editor to add some blocks to widget areas, all content is lost and I cannot see the blocks I added. Optin back in, by removing the opt out code does _not_ bring back the content. ## Step-by-step reproduction instructions 1. Have Gutenberg `trunk` 2. Change your theme to TwentyTwentyOne 3. Go to Appearance > Widgets 4. Add some blocks (eg a heading and an image) 5. Save 5. Go to Appearance > Customizer 6. Add another block 7. Publish 8. Check the blocks you added appear in the theme's footer sidebar 9. Go to Appearance > Theme editor 10. Edit the theme's `functions.php` file 11. At the end of `twenty_twenty_one_setup` add `remove_theme_support( 'widgets-block-editor' );`; 12. Save 13. Go to Dashboard 14. Go to Appearance > Widgets 15. Notice the classic screens shows up 16. **No block in the the footer sidebar** ## Expected behaviour I expect all content remains no matter how many times I switch between optin in and opting out. ## Actual behaviour Content (blocks and legacy widgets) is lost when opting out of the `widgets-block-editor` supprt.
non_priority
disabling block widgets via theme supports wipes out content please fill out all required sections bug reports with missing information will be closed before submitting a bug report check if the bug has already been fixed by updating wordpress and or gutenberg check if the bug is caused by a plugin by deactivating all plugins except gutenberg check if the bug is caused by a theme by activating a default theme e g twenty twenty check if the bug has already been reported by searching if this is a security issue please report it in hackerone instead description when adding remove theme support widgets block editor to s functions php after using the block editor to add some blocks to widget areas all content is lost and i cannot see the blocks i added optin back in by removing the opt out code does not bring back the content step by step reproduction instructions have gutenberg trunk change your theme to twentytwentyone go to appearance widgets add some blocks eg a heading and an image save go to appearance customizer add another block publish check the blocks you added appear in the theme s footer sidebar go to appearance theme editor edit the theme s functions php file at the end of twenty twenty one setup add remove theme support widgets block editor save go to dashboard go to appearance widgets notice the classic screens shows up no block in the the footer sidebar expected behaviour i expect all content remains no matter how many times i switch between optin in and opting out actual behaviour content blocks and legacy widgets is lost when opting out of the widgets block editor supprt
0
49,521
26,189,353,423
IssuesEvent
2023-01-03 07:08:30
thesofproject/sof
https://api.github.com/repos/thesofproject/sof
closed
[FEATURE] Setup performance build to evaluate each pipeline/task performance.
enhancement performance
We want to measure the SOF performance in 3 dimensions. This would benefit new platform/feature enabling, core assignment and other topics. - [ ] **Memory**: break down the whole memory usage of SOF, include TEXT/DATA/BSS. Plan: 1. a dedicated map file for all TEXT/DATA/BSS and its details for each linked component. this is not done yet. 2. each pipeline buffer allocation status during running. maybe can get this info from fw logs, if there is other way, please tell. 3. based on 1 & 2 & memory.h data, you will know where is the big cost and then try to optimize it. - [ ] **Performance**: get performance (MCPS) of each task/pipeline . Plan: Get the cost of each task/stage, then add together to get performance of the whole pipeline(s). - [ ] **Power Consumption**: Get power data for HIFI DSP. Check and determine each DSP core frequency under different FW loading. Power data is directly related to DSP freq. With performance data, it's possible to adjust DSP freq. Plan: Need HW instrument to measure power data under different DSP freq. According to Liam, after get performance data, IPG team may adjust DSP frequency for power saving.
True
[FEATURE] Setup performance build to evaluate each pipeline/task performance. - We want to measure the SOF performance in 3 dimensions. This would benefit new platform/feature enabling, core assignment and other topics. - [ ] **Memory**: break down the whole memory usage of SOF, include TEXT/DATA/BSS. Plan: 1. a dedicated map file for all TEXT/DATA/BSS and its details for each linked component. this is not done yet. 2. each pipeline buffer allocation status during running. maybe can get this info from fw logs, if there is other way, please tell. 3. based on 1 & 2 & memory.h data, you will know where is the big cost and then try to optimize it. - [ ] **Performance**: get performance (MCPS) of each task/pipeline . Plan: Get the cost of each task/stage, then add together to get performance of the whole pipeline(s). - [ ] **Power Consumption**: Get power data for HIFI DSP. Check and determine each DSP core frequency under different FW loading. Power data is directly related to DSP freq. With performance data, it's possible to adjust DSP freq. Plan: Need HW instrument to measure power data under different DSP freq. According to Liam, after get performance data, IPG team may adjust DSP frequency for power saving.
non_priority
setup performance build to evaluate each pipeline task performance we want to measure the sof performance in dimensions this would benefit new platform feature enabling core assignment and other topics memory break down the whole memory usage of sof include text data bss plan a dedicated map file for all text data bss and its details for each linked component this is not done yet each pipeline buffer allocation status during running maybe can get this info from fw logs if there is other way please tell based on memory h data you will know where is the big cost and then try to optimize it performance get performance mcps of each task pipeline plan get the cost of each task stage then add together to get performance of the whole pipeline s power consumption get power data for hifi dsp check and determine each dsp core frequency under different fw loading power data is directly related to dsp freq with performance data it s possible to adjust dsp freq plan need hw instrument to measure power data under different dsp freq according to liam after get performance data ipg team may adjust dsp frequency for power saving
0
232,794
18,909,443,788
IssuesEvent
2021-11-16 12:39:48
IgniteUI/igniteui-webcomponents
https://api.github.com/repos/IgniteUI/igniteui-webcomponents
closed
Button - Bootstrap Theme - When theme is applied, button does not look like a bootstrap button
bug status: awaiting-test
## Description When the bootstrap theme is applied, the button component does not look like a bootstrap button. Here is what the bootstrap buttons look like depending on which button style (primary, secondary, success, etc) they use: ![image](https://user-images.githubusercontent.com/835562/140168620-b14d1196-e707-4852-be6d-6b8cdcc5547d.png) Here is what the igc-button looks like when the bootstrap theme is applied ![image](https://user-images.githubusercontent.com/835562/140167275-705c36c2-93e6-4ac5-a1f5-566326da4a8f.png) ## Steps to reproduce 1. Run story board 2. Apply bootstrap theme 3. Observe the button ## Result The button looks nothing like a bootstrap button ## Expected result The button needs to look like a bootstrap button when the bootstrap theme is applied
1.0
Button - Bootstrap Theme - When theme is applied, button does not look like a bootstrap button - ## Description When the bootstrap theme is applied, the button component does not look like a bootstrap button. Here is what the bootstrap buttons look like depending on which button style (primary, secondary, success, etc) they use: ![image](https://user-images.githubusercontent.com/835562/140168620-b14d1196-e707-4852-be6d-6b8cdcc5547d.png) Here is what the igc-button looks like when the bootstrap theme is applied ![image](https://user-images.githubusercontent.com/835562/140167275-705c36c2-93e6-4ac5-a1f5-566326da4a8f.png) ## Steps to reproduce 1. Run story board 2. Apply bootstrap theme 3. Observe the button ## Result The button looks nothing like a bootstrap button ## Expected result The button needs to look like a bootstrap button when the bootstrap theme is applied
non_priority
button bootstrap theme when theme is applied button does not look like a bootstrap button description when the bootstrap theme is applied the button component does not look like a bootstrap button here is what the bootstrap buttons look like depending on which button style primary secondary success etc they use here is what the igc button looks like when the bootstrap theme is applied steps to reproduce run story board apply bootstrap theme observe the button result the button looks nothing like a bootstrap button expected result the button needs to look like a bootstrap button when the bootstrap theme is applied
0
23,469
21,950,970,845
IssuesEvent
2022-05-24 07:54:03
maykinmedia/sdg-invoervoorziening
https://api.github.com/repos/maykinmedia/sdg-invoervoorziening
closed
Add update catalogus tests
enhancement inschatten epic:Usability
add the following tests: - test_create_catalog_from_reference_if_enabled - test_no_create_catalog_from_reference_if_disabled - test_create_products_from_reference_product - test_no_create_products_from_reference_without_active_version - test_correct_products_if_no_initial_version - test_correct_products_if_no_translations - test_update_products_with_latest_reference_texts
True
Add update catalogus tests - add the following tests: - test_create_catalog_from_reference_if_enabled - test_no_create_catalog_from_reference_if_disabled - test_create_products_from_reference_product - test_no_create_products_from_reference_without_active_version - test_correct_products_if_no_initial_version - test_correct_products_if_no_translations - test_update_products_with_latest_reference_texts
non_priority
add update catalogus tests add the following tests test create catalog from reference if enabled test no create catalog from reference if disabled test create products from reference product test no create products from reference without active version test correct products if no initial version test correct products if no translations test update products with latest reference texts
0